diff --git a/i2p2www/translations/de/LC_MESSAGES/blog.po b/i2p2www/translations/de/LC_MESSAGES/blog.po
index b8735360b2d3f6092b85e8c746a291a020b75a22..0f34ef331e3d210545ea8d6cdbe78db648fdb6b6 100644
--- a/i2p2www/translations/de/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/de/LC_MESSAGES/blog.po
@@ -11,7 +11,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-08-12 10:32+0000\n"
 "Last-Translator: str4d <str4d@i2pmail.org>\n"
 "Language-Team: German "
@@ -65,6 +65,7 @@ msgstr "`Download Seite`"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101
 msgid "RELEASE DETAILS"
 msgstr "RELEASE DETAILS"
 
@@ -76,6 +77,7 @@ msgstr "RELEASE DETAILS"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103
 msgid "Major Changes"
 msgstr "Wesentliche Änderungen"
 
@@ -91,6 +93,7 @@ msgstr "Wesentliche Änderungen"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112
 msgid "Bug Fixes"
 msgstr "Bug Fixes"
 
@@ -108,6 +111,7 @@ msgstr "Bug Fixes"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118
 msgid "Other"
 msgstr "Andere"
 
@@ -125,6 +129,7 @@ msgstr "Andere"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129
 msgid "SHA256 Checksums:"
 msgstr "SHA256 Checksumme:"
 
@@ -255,6 +260,7 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127
 msgid "Update GeoIP data (new installs and PPA only)"
 msgstr "GeoIP Daten Update (nur bei neuen Installationen oder PPA)"
 
@@ -899,6 +905,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107
 msgid "Anonymity Improvements"
 msgstr ""
 
@@ -1053,3 +1060,207 @@ msgstr ""
 msgid "UPnP fix for some hardware"
 msgstr ""
 
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2
+#, fuzzy
+msgid "0.9.8 Release"
+msgstr "0.9.4 Release"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
+msgid ""
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
+#, python-format
+msgid "30% of you will update via in-network torrent in this update cycle."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
+msgid "IPv6 Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
+msgid ""
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
+"the router console. If IPv6 is causing problems you may disable it there."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
+msgid ""
+"As a part of the IPv6 development effort, I2P now supports multiple \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
+"it if necessary.\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
+"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
+"bugs still to be fixed with multiple addresses of each type."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
+msgid ""
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
+"and disable it necessary. Please report any bugs on \n"
+"http://trac.i2p2.i2p."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42
+msgid "Rekeying Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
+msgid ""
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
+"torrent updates, and the recent network growth, we expect substantial \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
+"Please be patient and things should start to improve after a few days."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
+msgid ""
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
+"computation. Performance may also be poor during the first week\n"
+"due to the network churn.\n"
+"We will evaluate the network performace before deciding whether to\n"
+"change the key length on slower hardware in a future release."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
+msgid ""
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
+"network is still performing fairly well, so keep spreading the word."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69
+msgid "More Changes Coming"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71
+msgid ""
+"We're in the initial stages of desiging major changes to strengthen our \n"
+"crypto. Stronger crypto will use more CPU and it may possibly \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
+"minimum requirements will be announced well in advance."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81
+msgid "New Website"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83
+msgid ""
+"After a heroic effort by str4d, the new website preview is available at \n"
+"http://i2hq.srv.i2p2.de. We hope to see it go live at \n"
+"https://geti2p.net and http://www.i2p2.i2p soon.  Please \n"
+"contribute to the new website translations on Transifex, especially the \n"
+"website_priority resource."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
+msgid "Community Participation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93
+msgid ""
+"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n"
+"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
+"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
+"Several of us will be at 30C3 in Hamburg late this year.\n"
+"It's great to see people participating at these events and representing "
+"I2P."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
+msgid "IPv6 support for both NTCP and SSU"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109
+msgid "SSU protocol obfuscation by adding random padding"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110
+msgid "Longer encryption and DH private keys for users on faster platforms"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114
+msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115
+msgid "Fix translation of HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116
+msgid "Fix occasional runtime exception in NTCP"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
+msgid "Streaming: Improved recovery from lost acks, other fixes"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
+#, fuzzy
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr "Ãœbersetzungsupdates: Italienisch, Portugiesisch, Spanisch, Schwedisch"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
+msgid "New Romanian translation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126
+#, fuzzy
+msgid "Wrapper 3.5.20 (new installs and PPA only)"
+msgstr "GeoIP Daten Update (nur bei neuen Installationen oder PPA)"
+
diff --git a/i2p2www/translations/de/LC_MESSAGES/docs.po b/i2p2www/translations/de/LC_MESSAGES/docs.po
index ecf97c4db2faf74d63d6ca21e7a85616bf06d78a..112f62ac8483ab23e391526c6735e58120d308c7 100644
--- a/i2p2www/translations/de/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/de/LC_MESSAGES/docs.po
@@ -12,7 +12,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-16 07:16+0000\n"
 "Last-Translator: Ashoka <martin2p@posteo.de>\n"
 "Language-Team: German "
@@ -10193,11 +10193,57 @@ msgstr ""
 msgid "November 2010"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:6
-msgid "What do we mean by \"anonymous\"?"
+#: i2p2www/pages/site/docs/how/threat-model.html:7
+msgid "low"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:8
+msgid "medium"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:9
+msgid "high"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:34
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "Damage Potential"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:35
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "Reliability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:36
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "Exploitability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:37
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "Affected Users"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:38
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "Discoverability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:39
+msgid "Severity"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:40
+#: i2p2www/pages/site/docs/protocol/i2np.html:94
+msgid "Priority"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:45
+msgid "What do we mean by \"anonymous\"?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:47
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
 "to find out information you don't want them to know?\" - who you are, "
@@ -10215,7 +10261,7 @@ msgid ""
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:19
+#: i2p2www/pages/site/docs/how/threat-model.html:58
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
@@ -10224,7 +10270,7 @@ msgid ""
 "so that you may decide whether it meets your needs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:26
+#: i2p2www/pages/site/docs/how/threat-model.html:65
 msgid ""
 "We welcome further research and analysis on I2P's resistance to the "
 "threats described below.\n"
@@ -10233,11 +10279,11 @@ msgid ""
 "work focused on I2P is needed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:32
+#: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid "Network Topology Summary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:33
+#: i2p2www/pages/site/docs/how/threat-model.html:72
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
@@ -10246,7 +10292,7 @@ msgid ""
 "reviewing related literature:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:39
+#: i2p2www/pages/site/docs/how/threat-model.html:78
 msgid ""
 "<b>I2P is a free route mixnet</b> - the message creator explicitly "
 "defines the\n"
@@ -10257,7 +10303,7 @@ msgid ""
 "inbound tunnel)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:45
+#: i2p2www/pages/site/docs/how/threat-model.html:84
 msgid ""
 "<b>I2P has no official entry and exit points</b> - all peers fully "
 "participate in the \n"
@@ -10265,7 +10311,7 @@ msgid ""
 "application layer, a few proxies do exist)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:50
+#: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
 "<b>I2P is fully distributed</b> - there are no central controls or "
 "authorities.\n"
@@ -10280,7 +10326,7 @@ msgid ""
 "anonymity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:60
+#: i2p2www/pages/site/docs/how/threat-model.html:99
 #, python-format
 msgid ""
 "We have documented plans to implement <a "
@@ -10299,7 +10345,7 @@ msgid ""
 "delay features."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:71
+#: i2p2www/pages/site/docs/how/threat-model.html:110
 msgid ""
 "In theory, routers along the message path may inject an \n"
 "arbitrary number of hops before forwarding the message to the next peer, "
@@ -10307,11 +10353,11 @@ msgid ""
 "the current implementation does not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:78
-msgid "The Threat Model (Attacks)"
+#: i2p2www/pages/site/docs/how/threat-model.html:117
+msgid "The Threat Model"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:79
+#: i2p2www/pages/site/docs/how/threat-model.html:118
 msgid ""
 "I2P design started in 2003, not long after the advent of\n"
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
@@ -10323,7 +10369,7 @@ msgid ""
 "from the significant academic interest in Tor."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:89
+#: i2p2www/pages/site/docs/how/threat-model.html:128
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
 "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
@@ -10336,14 +10382,14 @@ msgid ""
 "this list to include new attacks as they are identified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:98
+#: i2p2www/pages/site/docs/how/threat-model.html:137
 msgid ""
 "Included are some attacks that may be unique to I2P.\n"
 "We do not have good answers for all these attacks, however\n"
 "we continue to do research and improve our defenses."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:104
+#: i2p2www/pages/site/docs/how/threat-model.html:143
 msgid ""
 "In addition, many of these attacks are significantly easier than\n"
 "they should be, due to the modest size of the current network.\n"
@@ -10354,7 +10400,7 @@ msgid ""
 "these attacks will become much harder."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:114
+#: i2p2www/pages/site/docs/how/threat-model.html:153
 #, python-format
 msgid ""
 "The\n"
@@ -10364,98 +10410,133 @@ msgid ""
 "to review."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:121
-msgid "Index"
+#: i2p2www/pages/site/docs/how/threat-model.html:160
+#, python-format
+msgid ""
+"Attacks are judged using the <a href=\"%(DREAD)s\">modified "
+"<strong>DREAD</strong> model</a>:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:123
-#: i2p2www/pages/site/docs/how/threat-model.html:143
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "If a threat exploit occurs, how much damage will be caused?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "How reliable is the attack?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "What is needed to exploit this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "How many users will be affected?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "How easy is it to discover this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:172
+#, python-format
+msgid ""
+"Each category is given a rating of low, medium or high. The severity\n"
+"and priority scores are calculated using the equations outlined\n"
+"<a href=\"%(DREAD)s\">here</a>."
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:178
+msgid "Index of Attacks"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:180
+#: i2p2www/pages/site/docs/how/threat-model.html:200
 msgid "Brute force attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:124
-#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:181
+#: i2p2www/pages/site/docs/how/threat-model.html:244
 msgid "Timing attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:125
-#: i2p2www/pages/site/docs/how/threat-model.html:220
+#: i2p2www/pages/site/docs/how/threat-model.html:182
+#: i2p2www/pages/site/docs/how/threat-model.html:281
 msgid "Intersection attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:126
-#: i2p2www/pages/site/docs/how/threat-model.html:298
+#: i2p2www/pages/site/docs/how/threat-model.html:183
+#: i2p2www/pages/site/docs/how/threat-model.html:361
 msgid "Denial of service attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:127
-#: i2p2www/pages/site/docs/how/threat-model.html:385
+#: i2p2www/pages/site/docs/how/threat-model.html:184
+#: i2p2www/pages/site/docs/how/threat-model.html:460
 msgid "Tagging attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:128
-#: i2p2www/pages/site/docs/how/threat-model.html:400
+#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:478
 msgid "Partitioning attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:129
-#: i2p2www/pages/site/docs/how/threat-model.html:438
+#: i2p2www/pages/site/docs/how/threat-model.html:186
+#: i2p2www/pages/site/docs/how/threat-model.html:518
 msgid "Predecessor attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:130
-#: i2p2www/pages/site/docs/how/threat-model.html:481
+#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:563
 msgid "Harvesting attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:131
-#: i2p2www/pages/site/docs/how/threat-model.html:525
+#: i2p2www/pages/site/docs/how/threat-model.html:188
+#: i2p2www/pages/site/docs/how/threat-model.html:610
 msgid "Identification Through Traffic Analysis"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:132
-#: i2p2www/pages/site/docs/how/threat-model.html:582
+#: i2p2www/pages/site/docs/how/threat-model.html:189
+#: i2p2www/pages/site/docs/how/threat-model.html:670
 msgid "Sybil attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:133
-#: i2p2www/pages/site/docs/how/threat-model.html:629
+#: i2p2www/pages/site/docs/how/threat-model.html:190
+#: i2p2www/pages/site/docs/how/threat-model.html:719
 msgid "Buddy Exhaustion attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:134
-#: i2p2www/pages/site/docs/how/threat-model.html:651
+#: i2p2www/pages/site/docs/how/threat-model.html:191
+#: i2p2www/pages/site/docs/how/threat-model.html:744
 msgid "Cryptographic attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:135
+#: i2p2www/pages/site/docs/how/threat-model.html:192
 msgid "Floodfill attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:136
-#: i2p2www/pages/site/docs/how/threat-model.html:707
+#: i2p2www/pages/site/docs/how/threat-model.html:193
+#: i2p2www/pages/site/docs/how/threat-model.html:805
 msgid "Other Network Database attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:137
+#: i2p2www/pages/site/docs/how/threat-model.html:194
 msgid "Attacks on centralized resources"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:138
-#: i2p2www/pages/site/docs/how/threat-model.html:770
+#: i2p2www/pages/site/docs/how/threat-model.html:195
+#: i2p2www/pages/site/docs/how/threat-model.html:871
 msgid "Development attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:139
+#: i2p2www/pages/site/docs/how/threat-model.html:196
 msgid "Implementation attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:140
-#: i2p2www/pages/site/docs/how/threat-model.html:849
+#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:955
 msgid "Other Defenses"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:145
+#: i2p2www/pages/site/docs/how/threat-model.html:204
 msgid ""
 "A brute force attack can be mounted by a global passive or active "
 "adversary, \n"
@@ -10476,7 +10557,7 @@ msgid ""
 "message)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:157
+#: i2p2www/pages/site/docs/how/threat-model.html:216
 msgid ""
 "However, a powerful attacker can use brute force to detect trends - if "
 "they \n"
@@ -10503,7 +10584,7 @@ msgid ""
 "not currently implemented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:174
+#: i2p2www/pages/site/docs/how/threat-model.html:233
 #, python-format
 msgid ""
 "As a partial defense against a single router or group of routers trying "
@@ -10516,7 +10597,7 @@ msgid ""
 "<a href=\"%(peerselection)s\">peer selection page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:248
 msgid ""
 "I2P's messages are unidirectional and do not necessarily imply that a "
 "reply\n"
@@ -10532,7 +10613,7 @@ msgid ""
 "slow to have passed the message along."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:258
 msgid ""
 "This sort of attack is powerful, but its applicability to I2P is non "
 "obvious,\n"
@@ -10550,7 +10631,7 @@ msgid ""
 "DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:207
+#: i2p2www/pages/site/docs/how/threat-model.html:268
 #, python-format
 msgid ""
 "Without protocol scrubbing or higher latency, global active adversaries "
@@ -10566,14 +10647,14 @@ msgid ""
 "but these are unimplemented in I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:216
+#: i2p2www/pages/site/docs/how/threat-model.html:277
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against "
 "Anonymous Systems</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:222
+#: i2p2www/pages/site/docs/how/threat-model.html:285
 msgid ""
 "Intersection attacks against low latency systems are extremely powerful -"
 "\n"
@@ -10589,7 +10670,7 @@ msgid ""
 "scenarios."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:232
+#: i2p2www/pages/site/docs/how/threat-model.html:295
 #, python-format
 msgid ""
 "In summary, if an attacker is at both ends of your tunnel at the same "
@@ -10600,61 +10681,61 @@ msgid ""
 "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:240
+#: i2p2www/pages/site/docs/how/threat-model.html:303
 msgid "Partial defenses implemented in I2P:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:244
+#: i2p2www/pages/site/docs/how/threat-model.html:307
 #, python-format
 msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:247
+#: i2p2www/pages/site/docs/how/threat-model.html:310
 #, python-format
 msgid ""
 "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
 "small group that changes slowly"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:250
+#: i2p2www/pages/site/docs/how/threat-model.html:313
 msgid "Limits on the number of tunnels routed through a single peer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:253
+#: i2p2www/pages/site/docs/how/threat-model.html:316
 msgid ""
 "Prevention of peers from the same /16 IP range from being members of a "
 "single tunnel"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:256
+#: i2p2www/pages/site/docs/how/threat-model.html:319
 msgid ""
 "For eepsites or other hosted services, we support\n"
 "simultaneous hosting on multiple routers, or\n"
 "<a href=\"#intersection\">multihoming</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:263
+#: i2p2www/pages/site/docs/how/threat-model.html:326
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
 "Also, we have made some design choices that may significantly increase "
 "our vulnerability:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:268
+#: i2p2www/pages/site/docs/how/threat-model.html:331
 msgid "We do not use low-bandwidth \"guard nodes\""
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:271
+#: i2p2www/pages/site/docs/how/threat-model.html:334
 msgid ""
 "We use tunnel pools comprised of several tunnels, and traffic can shift "
 "from tunnel to tunnel."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:274
+#: i2p2www/pages/site/docs/how/threat-model.html:337
 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:277
+#: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
 "Tunnel lengths are configurable.\n"
 "While 3-hop tunnels are recommended for full protection, several "
@@ -10662,7 +10743,7 @@ msgid ""
 "services use 2-hop tunnels by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:284
+#: i2p2www/pages/site/docs/how/threat-model.html:347
 #, python-format
 msgid ""
 "In the future, it could\n"
@@ -10677,26 +10758,26 @@ msgid ""
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:293
+#: i2p2www/pages/site/docs/how/threat-model.html:356
 #, python-format
 msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:300
+#: i2p2www/pages/site/docs/how/threat-model.html:363
 msgid ""
 "There are a whole slew of denial of service attacks available against "
 "I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:305
+#: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
 "<b>Greedy user attack:</b> This is simply\n"
 "people trying to consume significantly more resources than they are \n"
 "willing to contribute. The defense against this is:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:311
+#: i2p2www/pages/site/docs/how/threat-model.html:375
 #, python-format
 msgid ""
 "Set defaults so that most users provide resources to the network.\n"
@@ -10705,7 +10786,7 @@ msgid ""
 "over 95&#37; of I2P users relay traffic for others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:317
+#: i2p2www/pages/site/docs/how/threat-model.html:381
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
 "contribution (share percentage) to the network. Display easy-to-"
@@ -10714,13 +10795,13 @@ msgid ""
 "contributing."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:322
+#: i2p2www/pages/site/docs/how/threat-model.html:386
 msgid ""
 "Maintain a strong community with blogs, forums, IRC, and other means of "
 "communication."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:327
+#: i2p2www/pages/site/docs/how/threat-model.html:393
 #, python-format
 msgid ""
 "<b>Starvation attack:</b> A hostile user may attempt to harm the network "
@@ -10749,7 +10830,7 @@ msgid ""
 "significant efforts required in this area."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:344
+#: i2p2www/pages/site/docs/how/threat-model.html:413
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
@@ -10780,7 +10861,7 @@ msgid ""
 "operation</a> is implemented)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:360
+#: i2p2www/pages/site/docs/how/threat-model.html:432
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
@@ -10795,7 +10876,7 @@ msgid ""
 "bugs in the implementation."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:370
+#: i2p2www/pages/site/docs/how/threat-model.html:445
 #, python-format
 msgid ""
 "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
@@ -10811,7 +10892,7 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:386
+#: i2p2www/pages/site/docs/how/threat-model.html:464
 #, python-format
 msgid ""
 "Tagging attacks - modifying a message so that it can later be identified"
@@ -10837,7 +10918,7 @@ msgid ""
 "as the links are encrypted and messages signed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:402
+#: i2p2www/pages/site/docs/how/threat-model.html:482
 msgid ""
 "Partitioning attacks - finding ways to segregate (technically or "
 "analytically)\n"
@@ -10866,7 +10947,7 @@ msgid ""
 "the moment)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:418
+#: i2p2www/pages/site/docs/how/threat-model.html:498
 #, python-format
 msgid ""
 "Partitioning the network analytically by looking for differences in how "
@@ -10896,14 +10977,14 @@ msgid ""
 "which other tunnels or messages have those delays)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:434
+#: i2p2www/pages/site/docs/how/threat-model.html:514
 #, python-format
 msgid ""
 "Also discussed on the <a href=\"%(netdb)s#threat\">network database "
 "page</a> (bootstrap attack)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:440
+#: i2p2www/pages/site/docs/how/threat-model.html:522
 msgid ""
 "The predecessor attack is passively gathering statistics in an attempt to"
 " see\n"
@@ -10920,7 +11001,7 @@ msgid ""
 "target is located."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:450
+#: i2p2www/pages/site/docs/how/threat-model.html:532
 #, python-format
 msgid ""
 "I2P avoids this in four ways: first, the peers selected to participate in"
@@ -10945,7 +11026,7 @@ msgid ""
 "attackers will merely run into that gateway."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:467
+#: i2p2www/pages/site/docs/how/threat-model.html:549
 #, python-format
 msgid ""
 "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n"
@@ -10953,7 +11034,7 @@ msgid ""
 "See also <a href=\"#intersection\">the intersection attack</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:473
+#: i2p2www/pages/site/docs/how/threat-model.html:555
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n"
@@ -10961,7 +11042,7 @@ msgid ""
 "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:482
+#: i2p2www/pages/site/docs/how/threat-model.html:567
 msgid ""
 "\"Harvesting\" means compiling a list of users running I2P.\n"
 "It can be used for legal attacks and to help\n"
@@ -10969,7 +11050,7 @@ msgid ""
 "harvesting whatever references to other peers it can find."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:489
+#: i2p2www/pages/site/docs/how/threat-model.html:574
 msgid ""
 "I2P itself is not designed with effective defenses against\n"
 "this attack, since there is the distributed network database \n"
@@ -10977,17 +11058,17 @@ msgid ""
 "The following factors make the attack somewhat harder in practice:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:496
+#: i2p2www/pages/site/docs/how/threat-model.html:581
 msgid ""
 "Network growth will make it more difficult to obtain a given proportion "
 "of the network"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:499
+#: i2p2www/pages/site/docs/how/threat-model.html:584
 msgid "Floodfill routers implement query limits as DOS protection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:502
+#: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
 "\"Hidden mode\", which prevents a router from publishing its information "
 "to the netDb,\n"
@@ -10995,7 +11076,7 @@ msgid ""
 "could be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:508
+#: i2p2www/pages/site/docs/how/threat-model.html:593
 #, python-format
 msgid ""
 "In future implementations,\n"
@@ -11009,7 +11090,7 @@ msgid ""
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:517
+#: i2p2www/pages/site/docs/how/threat-model.html:602
 msgid ""
 "In the future, routers could use GeoIP to identify if they are in a "
 "particular\n"
@@ -11018,7 +11099,7 @@ msgid ""
 "enact other restricted route methods."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:526
+#: i2p2www/pages/site/docs/how/threat-model.html:614
 #, python-format
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
@@ -11032,21 +11113,21 @@ msgid ""
 "make it somewhat difficult to identify I2P traffic:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:536
+#: i2p2www/pages/site/docs/how/threat-model.html:624
 msgid "Random port selection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:539
+#: i2p2www/pages/site/docs/how/threat-model.html:627
 msgid "Point-to-Point Encryption of all traffic"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:542
+#: i2p2www/pages/site/docs/how/threat-model.html:630
 msgid ""
 "DH key exchange with no protocol bytes or other unencrypted constant "
 "fields"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:545
+#: i2p2www/pages/site/docs/how/threat-model.html:633
 #, python-format
 msgid ""
 "Simultaneous use of both\n"
@@ -11056,54 +11137,54 @@ msgid ""
 " track."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:553
+#: i2p2www/pages/site/docs/how/threat-model.html:641
 msgid ""
 "In the near future, we plan to directly address traffic analysis issues "
 "by further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:557
+#: i2p2www/pages/site/docs/how/threat-model.html:645
 msgid ""
 "Padding at the transport layer to random lengths, especially during the "
 "connection handshake"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:560
+#: i2p2www/pages/site/docs/how/threat-model.html:648
 msgid ""
 "Study of packet size distribution signatures, and additional padding as "
 "necessary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:563
+#: i2p2www/pages/site/docs/how/threat-model.html:651
 msgid ""
 "Development of additional transport methods that mimic SSL or other "
 "common protocols"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:566
+#: i2p2www/pages/site/docs/how/threat-model.html:654
 msgid ""
 "Review of padding strategies at higher layers to see how they affect "
 "packet sizes at the transport layer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:569
+#: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
 "Review of methods implemented by various state-level firewalls to block "
 "Tor"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:572
+#: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid "Working directly with DPI and obfuscation experts"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:577
+#: i2p2www/pages/site/docs/how/threat-model.html:665
 #, python-format
 msgid ""
 "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol "
 "Obfuscation</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:584
+#: i2p2www/pages/site/docs/how/threat-model.html:674
 msgid ""
 "Sybil describes a category of attacks where the adversary creates "
 "arbitrarily\n"
@@ -11133,15 +11214,15 @@ msgid ""
 "scarcity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:602
+#: i2p2www/pages/site/docs/how/threat-model.html:692
 msgid "Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:606
+#: i2p2www/pages/site/docs/how/threat-model.html:696
 msgid "Maintaining backward compatibility"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:609
+#: i2p2www/pages/site/docs/how/threat-model.html:699
 msgid ""
 "The classic HashCash problem -\n"
 "selecting HashCash values that are meaningful proofs of work on high-end "
@@ -11149,7 +11230,7 @@ msgid ""
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:616
+#: i2p2www/pages/site/docs/how/threat-model.html:706
 msgid ""
 "Various limitations on the number of routers in a given IP range restrict"
 "\n"
@@ -11159,21 +11240,21 @@ msgid ""
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:623
+#: i2p2www/pages/site/docs/how/threat-model.html:713
 #, python-format
 msgid ""
 "See the <a href=\"%(netdb)s#threat\">network database page</a>\n"
 "for more Sybil discussion."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:630
+#: i2p2www/pages/site/docs/how/threat-model.html:723
 #, python-format
 msgid ""
 "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure "
 "Lookup</a> Section 5.2)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:634
+#: i2p2www/pages/site/docs/how/threat-model.html:727
 #, python-format
 msgid ""
 "By refusing to accept or forward tunnel build requests, except to a "
@@ -11196,7 +11277,7 @@ msgid ""
 "Further research and defenses may be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:653
+#: i2p2www/pages/site/docs/how/threat-model.html:748
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
@@ -11224,7 +11305,7 @@ msgid ""
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:672
+#: i2p2www/pages/site/docs/how/threat-model.html:767
 #, python-format
 msgid ""
 "Upgrading the various data structures and protocols to support longer "
@@ -11237,7 +11318,7 @@ msgid ""
 "implement mechanisms to make it easier for future transitions."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:681
+#: i2p2www/pages/site/docs/how/threat-model.html:776
 msgid ""
 "In the future, several I2P protocols and data structures\n"
 "support securely padding messages to arbitrary sizes, so messages could "
@@ -11249,11 +11330,11 @@ msgid ""
 "end to end messages include simple random padding."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:691
+#: i2p2www/pages/site/docs/how/threat-model.html:786
 msgid "Floodfill Anonymity attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:692
+#: i2p2www/pages/site/docs/how/threat-model.html:790
 #, python-format
 msgid ""
 "In addition to the floodfill DOS attacks described\n"
@@ -11273,7 +11354,7 @@ msgid ""
 " future research."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:708
+#: i2p2www/pages/site/docs/how/threat-model.html:806
 #, python-format
 msgid ""
 "A hostile user may attempt to harm the network by\n"
@@ -11283,11 +11364,11 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:718
+#: i2p2www/pages/site/docs/how/threat-model.html:816
 msgid "Central Resource Attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:719
+#: i2p2www/pages/site/docs/how/threat-model.html:820
 msgid ""
 "There are a few centralized or limited resources (some inside I2P, some "
 "not)\n"
@@ -11302,14 +11383,14 @@ msgid ""
 "not the operation of the network itself."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:729
+#: i2p2www/pages/site/docs/how/threat-model.html:830
 #, python-format
 msgid ""
 "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
 " for external public access."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:732
+#: i2p2www/pages/site/docs/how/threat-model.html:833
 #, python-format
 msgid ""
 "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
@@ -11319,17 +11400,17 @@ msgid ""
 "reseed hosts may need improvement."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:737
+#: i2p2www/pages/site/docs/how/threat-model.html:838
 msgid ""
 "Routers now support multiple update file locations.\n"
 "A malicious update host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:741
+#: i2p2www/pages/site/docs/how/threat-model.html:842
 msgid "Routers now support multiple default trusted update signers."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:744
+#: i2p2www/pages/site/docs/how/threat-model.html:845
 msgid ""
 "Routers now better handle <a href=\"#ffdos\">multiple unreliable "
 "floodfill peers</a>.\n"
@@ -11337,21 +11418,21 @@ msgid ""
 "href=\"#floodfill\">more</a> study."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:748
+#: i2p2www/pages/site/docs/how/threat-model.html:849
 #, python-format
 msgid ""
 "The code is now stored in a <a href=\"%(monotone)s\">distributed source "
 "control system</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:751
+#: i2p2www/pages/site/docs/how/threat-model.html:852
 msgid ""
 "Routers rely on a single news host, but there is a hardcoded backup URL "
 "pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:755
+#: i2p2www/pages/site/docs/how/threat-model.html:856
 #, python-format
 msgid ""
 "<a href=\"%(naming)s\">Naming system services</a>, including addressbook "
@@ -11364,7 +11445,7 @@ msgid ""
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:762
+#: i2p2www/pages/site/docs/how/threat-model.html:863
 msgid ""
 "We remain reliant on the DNS service for i2p2.de, losing this would cause"
 " substantial\n"
@@ -11373,7 +11454,7 @@ msgid ""
 "loss of i2p.net did."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:772
+#: i2p2www/pages/site/docs/how/threat-model.html:875
 msgid ""
 "These attacks aren't directly on the network, but instead go after its "
 "development team \n"
@@ -11389,11 +11470,11 @@ msgid ""
 "have a big problem."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:781
+#: i2p2www/pages/site/docs/how/threat-model.html:884
 msgid "However, two techniques help defend against these attacks:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:785
+#: i2p2www/pages/site/docs/how/threat-model.html:888
 #, python-format
 msgid ""
 "All components of the network must be open source to enable inspection, "
@@ -11409,7 +11490,7 @@ msgid ""
 "to restrict modifications to those previously approved."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:793
+#: i2p2www/pages/site/docs/how/threat-model.html:896
 #, python-format
 msgid ""
 "Development over the network itself, allowing developers to stay "
@@ -11423,18 +11504,18 @@ msgid ""
 "all available within I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:804
+#: i2p2www/pages/site/docs/how/threat-model.html:907
 msgid ""
 "We also maintain relationships with various organizations that offer "
 "legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:809
+#: i2p2www/pages/site/docs/how/threat-model.html:912
 msgid "Implementation attacks (bugs)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:810
+#: i2p2www/pages/site/docs/how/threat-model.html:916
 msgid ""
 "Try as we might, most nontrivial applications include errors in the "
 "design or \n"
@@ -11451,7 +11532,7 @@ msgid ""
 "obscurity</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:821
+#: i2p2www/pages/site/docs/how/threat-model.html:927
 msgid ""
 "In addition, the code is being \n"
 "treated the same way, with little aversion towards reworking or throwing "
@@ -11467,7 +11548,7 @@ msgid ""
 "enough to identify shortcomings and bugs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:831
+#: i2p2www/pages/site/docs/how/threat-model.html:937
 msgid ""
 "Our software is likely, in particular, to contain bugs related to denial "
 "of service\n"
@@ -11477,7 +11558,7 @@ msgid ""
 "protocols."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:837
+#: i2p2www/pages/site/docs/how/threat-model.html:943
 #, python-format
 msgid ""
 "I2P is still a small network with a small development community and "
@@ -11489,11 +11570,11 @@ msgid ""
 "<a href=\"%(volunteer)s\">get involved</a> and help."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:850
+#: i2p2www/pages/site/docs/how/threat-model.html:956
 msgid "Blocklists"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:851
+#: i2p2www/pages/site/docs/how/threat-model.html:957
 msgid ""
 "To some extent, I2P could be enhanced to avoid peers operating at IP "
 "addresses\n"
@@ -11503,7 +11584,7 @@ msgid ""
 "others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:857
+#: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
 "To the extent that active peers actually do show up in the actual "
 "blocklist,\n"
@@ -11513,7 +11594,7 @@ msgid ""
 "enable it by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:865
+#: i2p2www/pages/site/docs/how/threat-model.html:971
 msgid ""
 "Blocklists are only a part (perhaps a small part) of an array of defenses"
 "\n"
@@ -11524,7 +11605,7 @@ msgid ""
 "list above there are improvements we can make in detecting badness."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:874
+#: i2p2www/pages/site/docs/how/threat-model.html:980
 msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
@@ -11534,7 +11615,7 @@ msgid ""
 "the i2p network down. Completely."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:882
+#: i2p2www/pages/site/docs/how/threat-model.html:988
 msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
@@ -12764,10 +12845,6 @@ msgstr ""
 msgid "Type"
 msgstr ""
 
-#: i2p2www/pages/site/docs/protocol/i2np.html:94
-msgid "Priority"
-msgstr ""
-
 #: i2p2www/pages/site/docs/protocol/i2np.html:95
 msgid "Comments"
 msgstr ""
diff --git a/i2p2www/translations/de/LC_MESSAGES/get-involved.po b/i2p2www/translations/de/LC_MESSAGES/get-involved.po
index 6ed55debb5f859f1a7896806903b3a901758f898..2ffad8194be6bcff44b8fb18c0a4ba76bffc9e7e 100644
--- a/i2p2www/translations/de/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/de/LC_MESSAGES/get-involved.po
@@ -11,7 +11,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-07-04 16:33+0000\n"
 "Last-Translator: D.A. Loader\n"
 "Language-Team: German "
@@ -1156,29 +1156,29 @@ msgid "Current bounties"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Name"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Status"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Judge"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Dev"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Bounty"
 msgstr ""
 
@@ -1190,9 +1190,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:40
 #: i2p2www/pages/site/get-involved/bounties/index.html:47
 #: i2p2www/pages/site/get-involved/bounties/index.html:54
-#: i2p2www/pages/site/get-involved/bounties/index.html:61
+#: i2p2www/pages/site/get-involved/bounties/index.html:75
 #: i2p2www/pages/site/get-involved/bounties/index.html:82
-#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Proposal in development"
 msgstr ""
 
@@ -1200,9 +1199,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:42
 #: i2p2www/pages/site/get-involved/bounties/index.html:49
 #: i2p2www/pages/site/get-involved/bounties/index.html:56
-#: i2p2www/pages/site/get-involved/bounties/index.html:63
-#: i2p2www/pages/site/get-involved/bounties/index.html:84
-#: i2p2www/pages/site/get-involved/bounties/index.html:104
+#: i2p2www/pages/site/get-involved/bounties/index.html:77
+#: i2p2www/pages/site/get-involved/bounties/index.html:97
 msgid "vacant"
 msgstr ""
 
@@ -1215,49 +1213,49 @@ msgid "Backporting Phex code onto I2PHex"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:53
-msgid "Make I2P IPv6 native"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "I2P package in Debian and Ubuntu mirrors"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:67
+#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "Bitcoin client for I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:68
+#: i2p2www/pages/site/get-involved/bounties/index.html:61
 msgid "Done, phase of verification"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:74
+#: i2p2www/pages/site/get-involved/bounties/index.html:67
 msgid "Unit tests and Multi-router Simulation"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:75
+#: i2p2www/pages/site/get-involved/bounties/index.html:68
 msgid "Partly done, partly in work, partly still open"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:96
+#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:101
+#: i2p2www/pages/site/get-involved/bounties/index.html:94
 msgid "Bundling bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:102
+#: i2p2www/pages/site/get-involved/bounties/index.html:95
 msgid "Proposed"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:109
+#: i2p2www/pages/site/get-involved/bounties/index.html:102
 msgid "Claimed bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Dev team"
 msgstr ""
 
+#: i2p2www/pages/site/get-involved/bounties/index.html:107
+msgid "Make I2P IPv6 native"
+msgstr ""
+
 #: i2p2www/pages/site/get-involved/bounties/index.html:114
 msgid "Setting up a SILC server"
 msgstr ""
@@ -1312,7 +1310,7 @@ msgid ""
 "IPv6 connections like it does on IPv4."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15
+#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17
 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
 msgid ""
 "For bounties to be declared done and paid, we need the plugin AND the "
diff --git a/i2p2www/translations/de/LC_MESSAGES/priority.po b/i2p2www/translations/de/LC_MESSAGES/priority.po
index 19af8ea81009b0443e840142a80cc71a69588c11..be552ed68e3df15b25671213c67e5426ce21c2be 100644
--- a/i2p2www/translations/de/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/de/LC_MESSAGES/priority.po
@@ -12,7 +12,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-17 11:37+0000\n"
 "Last-Translator: nextloop <ga25day@mytum.de>\n"
 "Language-Team: German "
@@ -2575,22 +2575,26 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr ""
 
diff --git a/i2p2www/translations/es/LC_MESSAGES/blog.po b/i2p2www/translations/es/LC_MESSAGES/blog.po
index ad637de55f0c21e75339fb523b32ea03ecd5effa..dc574094b5ece307daaab1101405b2d88465f0d7 100644
--- a/i2p2www/translations/es/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/es/LC_MESSAGES/blog.po
@@ -13,7 +13,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-08-12 10:32+0000\n"
 "Last-Translator: str4d <str4d@i2pmail.org>\n"
 "Language-Team: Spanish "
@@ -67,6 +67,7 @@ msgstr "`Página de Descargas`"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101
 msgid "RELEASE DETAILS"
 msgstr "DETALLES DEL LANZAMIENTO"
 
@@ -78,6 +79,7 @@ msgstr "DETALLES DEL LANZAMIENTO"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103
 msgid "Major Changes"
 msgstr "Cambios más importantes"
 
@@ -93,6 +95,7 @@ msgstr "Cambios más importantes"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112
 msgid "Bug Fixes"
 msgstr "Correcciones de errores"
 
@@ -110,6 +113,7 @@ msgstr "Correcciones de errores"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118
 msgid "Other"
 msgstr "Otro"
 
@@ -127,6 +131,7 @@ msgstr "Otro"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129
 msgid "SHA256 Checksums:"
 msgstr "Sumas de comprobación SHA256:"
 
@@ -284,6 +289,7 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127
 msgid "Update GeoIP data (new installs and PPA only)"
 msgstr "Actualizar datos de geolocalización IP (Sólo PPA y nuevas instalaciones)"
 
@@ -1048,6 +1054,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107
 msgid "Anonymity Improvements"
 msgstr ""
 
@@ -1202,3 +1209,210 @@ msgstr ""
 msgid "UPnP fix for some hardware"
 msgstr ""
 
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2
+#, fuzzy
+msgid "0.9.8 Release"
+msgstr "Versión 0.9.6"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
+msgid ""
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
+#, python-format
+msgid "30% of you will update via in-network torrent in this update cycle."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
+msgid "IPv6 Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
+msgid ""
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
+"the router console. If IPv6 is causing problems you may disable it there."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
+msgid ""
+"As a part of the IPv6 development effort, I2P now supports multiple \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
+"it if necessary.\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
+"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
+"bugs still to be fixed with multiple addresses of each type."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
+msgid ""
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
+"and disable it necessary. Please report any bugs on \n"
+"http://trac.i2p2.i2p."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42
+msgid "Rekeying Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
+msgid ""
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
+"torrent updates, and the recent network growth, we expect substantial \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
+"Please be patient and things should start to improve after a few days."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
+msgid ""
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
+"computation. Performance may also be poor during the first week\n"
+"due to the network churn.\n"
+"We will evaluate the network performace before deciding whether to\n"
+"change the key length on slower hardware in a future release."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
+msgid ""
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
+"network is still performing fairly well, so keep spreading the word."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69
+#, fuzzy
+msgid "More Changes Coming"
+msgstr "Cambios mayores"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71
+msgid ""
+"We're in the initial stages of desiging major changes to strengthen our \n"
+"crypto. Stronger crypto will use more CPU and it may possibly \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
+"minimum requirements will be announced well in advance."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81
+msgid "New Website"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83
+msgid ""
+"After a heroic effort by str4d, the new website preview is available at \n"
+"http://i2hq.srv.i2p2.de. We hope to see it go live at \n"
+"https://geti2p.net and http://www.i2p2.i2p soon.  Please \n"
+"contribute to the new website translations on Transifex, especially the \n"
+"website_priority resource."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
+msgid "Community Participation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93
+msgid ""
+"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n"
+"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
+"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
+"Several of us will be at 30C3 in Hamburg late this year.\n"
+"It's great to see people participating at these events and representing "
+"I2P."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
+msgid "IPv6 support for both NTCP and SSU"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109
+msgid "SSU protocol obfuscation by adding random padding"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110
+msgid "Longer encryption and DH private keys for users on faster platforms"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114
+msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115
+msgid "Fix translation of HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116
+msgid "Fix occasional runtime exception in NTCP"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
+msgid "Streaming: Improved recovery from lost acks, other fixes"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
+#, fuzzy
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr ""
+"Traducciones actualizadas: chino, francés, alemán, italiano, polaco, "
+"portugués, sueco y ucraniano"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
+msgid "New Romanian translation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126
+#, fuzzy
+msgid "Wrapper 3.5.20 (new installs and PPA only)"
+msgstr "Actualizado el wrapper a 3.5.17 (sólo para instalaciones nuevas y PPA)"
+
diff --git a/i2p2www/translations/es/LC_MESSAGES/docs.po b/i2p2www/translations/es/LC_MESSAGES/docs.po
index 483f928f233445be30e9737a981324b031091657..39b29bf9a6a0fb3152bbdedf1ef019ff13518e44 100644
--- a/i2p2www/translations/es/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/es/LC_MESSAGES/docs.po
@@ -14,7 +14,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-30 09:52+0000\n"
 "Last-Translator: trolly <translatortr@i2pmail.org>\n"
 "Language-Team: Spanish "
@@ -13896,11 +13896,58 @@ msgstr "Modelos de riesgo en I2P"
 msgid "November 2010"
 msgstr "Noviembre 2010"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:6
+#: i2p2www/pages/site/docs/how/threat-model.html:7
+msgid "low"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:8
+msgid "medium"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:9
+msgid "high"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:34
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "Damage Potential"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:35
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "Reliability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:36
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "Exploitability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:37
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "Affected Users"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:38
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "Discoverability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:39
+#, fuzzy
+msgid "Severity"
+msgstr "Seguridad"
+
+#: i2p2www/pages/site/docs/how/threat-model.html:40
+#: i2p2www/pages/site/docs/protocol/i2np.html:94
+msgid "Priority"
+msgstr "Prioridad"
+
+#: i2p2www/pages/site/docs/how/threat-model.html:45
 msgid "What do we mean by \"anonymous\"?"
 msgstr "¿Qué quiere decir con \"anónimo\"?"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:8
+#: i2p2www/pages/site/docs/how/threat-model.html:47
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
 "to find out information you don't want them to know?\" - who you are, "
@@ -13928,7 +13975,7 @@ msgstr ""
 "webs, o para aquellos que intercambian información, hasta aquellos con "
 "miedo de ser descubiertos por organizaciones poderosas o estados."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:19
+#: i2p2www/pages/site/docs/how/threat-model.html:58
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
@@ -13941,7 +13988,7 @@ msgstr ""
 "pregunta explorando como I2P opera ante varios atauqes y así puede "
 "decidir si se amolda a sus necesidades."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:26
+#: i2p2www/pages/site/docs/how/threat-model.html:65
 msgid ""
 "We welcome further research and analysis on I2P's resistance to the "
 "threats described below.\n"
@@ -13954,11 +14001,11 @@ msgstr ""
 " los textos ya existentes (la mayoría sobre Tor) y trabajos originales "
 "sobre I2P."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:32
+#: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid "Network Topology Summary"
 msgstr "Sumario de la topología de la red"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:33
+#: i2p2www/pages/site/docs/how/threat-model.html:72
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
@@ -13971,7 +14018,7 @@ msgstr ""
 "<a href=\"%(links)s\">sistemas</a>, pero a la hora de revisar la "
 "información hay que tener en cuenta varios puntos:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:39
+#: i2p2www/pages/site/docs/how/threat-model.html:78
 msgid ""
 "<b>I2P is a free route mixnet</b> - the message creator explicitly "
 "defines the\n"
@@ -13986,7 +14033,7 @@ msgstr ""
 "salida), y el receptor del mensaje define explícitamente el camino por el"
 " cual serán recibidos los mensajes (el túnel de entrada)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:45
+#: i2p2www/pages/site/docs/how/threat-model.html:84
 msgid ""
 "<b>I2P has no official entry and exit points</b> - all peers fully "
 "participate in the \n"
@@ -13998,7 +14045,7 @@ msgstr ""
 "o salida en la capa de red (aún así existen varios proxies de salida en "
 "la capa de aplicación)"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:50
+#: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
 "<b>I2P is fully distributed</b> - there are no central controls or "
 "authorities.\n"
@@ -14020,7 +14067,7 @@ msgstr ""
 "la red, pero por supuesto no es necesario hacer nada de esto (y además "
 "podría poner en peligro su anonimato)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:60
+#: i2p2www/pages/site/docs/how/threat-model.html:99
 #, python-format
 msgid ""
 "We have documented plans to implement <a "
@@ -14049,7 +14096,7 @@ msgstr ""
 "la implementación de esos retardos será un gran desafío. No está claro "
 "aún si implementaremos estas características de retardo."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:71
+#: i2p2www/pages/site/docs/how/threat-model.html:110
 msgid ""
 "In theory, routers along the message path may inject an \n"
 "arbitrary number of hops before forwarding the message to the next peer, "
@@ -14060,11 +14107,12 @@ msgstr ""
 "arbitrario de saltos antes de enviar el mensaje al siguiente par, pero la"
 " implementación actual no lo hace."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:78
-msgid "The Threat Model (Attacks)"
-msgstr "El modelo de reisgos (Ataques)"
+#: i2p2www/pages/site/docs/how/threat-model.html:117
+#, fuzzy
+msgid "The Threat Model"
+msgstr "Modelos de riesgo en I2P"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:79
+#: i2p2www/pages/site/docs/how/threat-model.html:118
 msgid ""
 "I2P design started in 2003, not long after the advent of\n"
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
@@ -14086,7 +14134,7 @@ msgstr ""
 "cebolla, así que continuamos beneficiándonos del significativo interés \n"
 "académico en Tor."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:89
+#: i2p2www/pages/site/docs/how/threat-model.html:128
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
 "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
@@ -14107,7 +14155,7 @@ msgstr ""
 "en i2P. Actualizaremos esta lista según sean identificados nuevos "
 "ataques."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:98
+#: i2p2www/pages/site/docs/how/threat-model.html:137
 msgid ""
 "Included are some attacks that may be unique to I2P.\n"
 "We do not have good answers for all these attacks, however\n"
@@ -14117,7 +14165,7 @@ msgstr ""
 " soluciones perfectas para esos ataques, pero continuamos estudiando como"
 " defendernos de ellos."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:104
+#: i2p2www/pages/site/docs/how/threat-model.html:143
 msgid ""
 "In addition, many of these attacks are significantly easier than\n"
 "they should be, due to the modest size of the current network.\n"
@@ -14134,7 +14182,7 @@ msgstr ""
 "vayamos difundiendo la palabra y la red crezca, esos ataques serán mucho "
 "mas difíciles de llevar acabo."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:114
+#: i2p2www/pages/site/docs/how/threat-model.html:153
 #, python-format
 msgid ""
 "The\n"
@@ -14147,98 +14195,134 @@ msgstr ""
 "entre redes</a> y <a href=\"%(garlicrouting)s\">\"terminología garlic</a>"
 " sobre el tema."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:121
-msgid "Index"
-msgstr "Índice"
+#: i2p2www/pages/site/docs/how/threat-model.html:160
+#, python-format
+msgid ""
+"Attacks are judged using the <a href=\"%(DREAD)s\">modified "
+"<strong>DREAD</strong> model</a>:"
+msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:123
-#: i2p2www/pages/site/docs/how/threat-model.html:143
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "If a threat exploit occurs, how much damage will be caused?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "How reliable is the attack?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "What is needed to exploit this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "How many users will be affected?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "How easy is it to discover this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:172
+#, python-format
+msgid ""
+"Each category is given a rating of low, medium or high. The severity\n"
+"and priority scores are calculated using the equations outlined\n"
+"<a href=\"%(DREAD)s\">here</a>."
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:178
+#, fuzzy
+msgid "Index of Attacks"
+msgstr "Ataques de sincronización"
+
+#: i2p2www/pages/site/docs/how/threat-model.html:180
+#: i2p2www/pages/site/docs/how/threat-model.html:200
 msgid "Brute force attacks"
 msgstr "Ataques de fuerza bruta"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:124
-#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:181
+#: i2p2www/pages/site/docs/how/threat-model.html:244
 msgid "Timing attacks"
 msgstr "Ataques de sincronización"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:125
-#: i2p2www/pages/site/docs/how/threat-model.html:220
+#: i2p2www/pages/site/docs/how/threat-model.html:182
+#: i2p2www/pages/site/docs/how/threat-model.html:281
 msgid "Intersection attacks"
 msgstr "Ataques por intersección"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:126
-#: i2p2www/pages/site/docs/how/threat-model.html:298
+#: i2p2www/pages/site/docs/how/threat-model.html:183
+#: i2p2www/pages/site/docs/how/threat-model.html:361
 msgid "Denial of service attacks"
 msgstr "Ataques de denegación de servicio"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:127
-#: i2p2www/pages/site/docs/how/threat-model.html:385
+#: i2p2www/pages/site/docs/how/threat-model.html:184
+#: i2p2www/pages/site/docs/how/threat-model.html:460
 msgid "Tagging attacks"
 msgstr "Ataques de etiquetado"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:128
-#: i2p2www/pages/site/docs/how/threat-model.html:400
+#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:478
 msgid "Partitioning attacks"
 msgstr "Ataques de particionamiento"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:129
-#: i2p2www/pages/site/docs/how/threat-model.html:438
+#: i2p2www/pages/site/docs/how/threat-model.html:186
+#: i2p2www/pages/site/docs/how/threat-model.html:518
 msgid "Predecessor attacks"
 msgstr "Ataques del predecesor"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:130
-#: i2p2www/pages/site/docs/how/threat-model.html:481
+#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:563
 msgid "Harvesting attacks"
 msgstr "Ataques de cosechado"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:131
-#: i2p2www/pages/site/docs/how/threat-model.html:525
+#: i2p2www/pages/site/docs/how/threat-model.html:188
+#: i2p2www/pages/site/docs/how/threat-model.html:610
 msgid "Identification Through Traffic Analysis"
 msgstr "Identificación a través de análisis del tráfico"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:132
-#: i2p2www/pages/site/docs/how/threat-model.html:582
+#: i2p2www/pages/site/docs/how/threat-model.html:189
+#: i2p2www/pages/site/docs/how/threat-model.html:670
 msgid "Sybil attacks"
 msgstr "Ataques Sybil"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:133
-#: i2p2www/pages/site/docs/how/threat-model.html:629
+#: i2p2www/pages/site/docs/how/threat-model.html:190
+#: i2p2www/pages/site/docs/how/threat-model.html:719
 msgid "Buddy Exhaustion attacks"
 msgstr "Ataques por agotamiento de amigos"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:134
-#: i2p2www/pages/site/docs/how/threat-model.html:651
+#: i2p2www/pages/site/docs/how/threat-model.html:191
+#: i2p2www/pages/site/docs/how/threat-model.html:744
 msgid "Cryptographic attacks"
 msgstr "Ataques de cifrados"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:135
+#: i2p2www/pages/site/docs/how/threat-model.html:192
 msgid "Floodfill attacks"
 msgstr "Ataques Floodfill"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:136
-#: i2p2www/pages/site/docs/how/threat-model.html:707
+#: i2p2www/pages/site/docs/how/threat-model.html:193
+#: i2p2www/pages/site/docs/how/threat-model.html:805
 msgid "Other Network Database attacks"
 msgstr "Otros ataques a la base de datos de la red"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:137
+#: i2p2www/pages/site/docs/how/threat-model.html:194
 msgid "Attacks on centralized resources"
 msgstr "Ataques a recursos centralizados"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:138
-#: i2p2www/pages/site/docs/how/threat-model.html:770
+#: i2p2www/pages/site/docs/how/threat-model.html:195
+#: i2p2www/pages/site/docs/how/threat-model.html:871
 msgid "Development attacks"
 msgstr "Ataques de desarrollo"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:139
+#: i2p2www/pages/site/docs/how/threat-model.html:196
 msgid "Implementation attacks"
 msgstr "Ataques de implementación"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:140
-#: i2p2www/pages/site/docs/how/threat-model.html:849
+#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:955
 msgid "Other Defenses"
 msgstr "Otras defensas"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:145
+#: i2p2www/pages/site/docs/how/threat-model.html:204
 msgid ""
 "A brute force attack can be mounted by a global passive or active "
 "adversary, \n"
@@ -14269,7 +14353,7 @@ msgstr ""
 "después enviada (haciendo que un mensaje de 1024 bytes sea indistinguible"
 " de un mensaje de 2048 bytes)"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:157
+#: i2p2www/pages/site/docs/how/threat-model.html:216
 msgid ""
 "However, a powerful attacker can use brute force to detect trends - if "
 "they \n"
@@ -14309,7 +14393,7 @@ msgstr ""
 "usar leasesets cifrados o no publicados para las eepsites. Otras medidas,"
 " como retardos no triviales y rutas restringidas no se han implementado."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:174
+#: i2p2www/pages/site/docs/how/threat-model.html:233
 #, python-format
 msgid ""
 "As a partial defense against a single router or group of routers trying "
@@ -14328,7 +14412,7 @@ msgstr ""
 "selección y anulación de los ruters son discutidos en la <a "
 "href=\"%(peerselection)s\">página de selección de ruters</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:248
 msgid ""
 "I2P's messages are unidirectional and do not necessarily imply that a "
 "reply\n"
@@ -14352,7 +14436,7 @@ msgstr ""
 "de la red, un atacante podría inhabilitar algunos enlaces como mensajes "
 "demasiado lentos como para ser pasados."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:258
 msgid ""
 "This sort of attack is powerful, but its applicability to I2P is non "
 "obvious,\n"
@@ -14379,7 +14463,7 @@ msgstr ""
 "igual que que el modo de mensaje de la garantía del envío (con el "
 "DataMessage+DeliveryStatusMessage)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:207
+#: i2p2www/pages/site/docs/how/threat-model.html:268
 #, python-format
 msgid ""
 "Without protocol scrubbing or higher latency, global active adversaries "
@@ -14403,7 +14487,7 @@ msgstr ""
 "href=\"%(todo)s#batching\">técnicas</a> de enrutado avanzado de túneles, "
 "pero estas no están implementadas en I2P."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:216
+#: i2p2www/pages/site/docs/how/threat-model.html:277
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against "
@@ -14412,7 +14496,7 @@ msgstr ""
 "Referencias: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against "
 "Anonymous Systems</a>"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:222
+#: i2p2www/pages/site/docs/how/threat-model.html:285
 msgid ""
 "Intersection attacks against low latency systems are extremely powerful -"
 "\n"
@@ -14435,7 +14519,7 @@ msgstr ""
 "mensaje pasa a través. El costo de este ataque aumenta según aumenta el "
 "tamaño de la red, pero puede ser válido en varios escenarios."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:232
+#: i2p2www/pages/site/docs/how/threat-model.html:295
 #, python-format
 msgid ""
 "In summary, if an attacker is at both ends of your tunnel at the same "
@@ -14451,16 +14535,16 @@ msgstr ""
 "enrutado onion de baja latencia. Tor proporciona una <a "
 "href=\"%(url)s\">aclaración similar</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:240
+#: i2p2www/pages/site/docs/how/threat-model.html:303
 msgid "Partial defenses implemented in I2P:"
 msgstr "Defensa parcialmente implementada en I2P:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:244
+#: i2p2www/pages/site/docs/how/threat-model.html:307
 #, python-format
 msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers"
 msgstr "<a href=\"%(tunnelimpl)s#ordering\">orden estricto</a> de pares"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:247
+#: i2p2www/pages/site/docs/how/threat-model.html:310
 #, python-format
 msgid ""
 "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
@@ -14469,11 +14553,11 @@ msgstr ""
 "<a href=\"%(peerselection)s\">selección y perfiles de los pares</a> de un"
 " pequeño grupo que cambia lentamente"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:250
+#: i2p2www/pages/site/docs/how/threat-model.html:313
 msgid "Limits on the number of tunnels routed through a single peer"
 msgstr "Límite en el número de túneles rutados a través de un solo par"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:253
+#: i2p2www/pages/site/docs/how/threat-model.html:316
 msgid ""
 "Prevention of peers from the same /16 IP range from being members of a "
 "single tunnel"
@@ -14481,7 +14565,7 @@ msgstr ""
 "Prevención de pares del mismo rango /16 de IPs por ser miembros del mismo"
 " único túnel."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:256
+#: i2p2www/pages/site/docs/how/threat-model.html:319
 msgid ""
 "For eepsites or other hosted services, we support\n"
 "simultaneous hosting on multiple routers, or\n"
@@ -14491,7 +14575,7 @@ msgstr ""
 "simultáneo en múltiples ruters, o <a "
 "href=\"#intersection\">multihoming</a>"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:263
+#: i2p2www/pages/site/docs/how/threat-model.html:326
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
 "Also, we have made some design choices that may significantly increase "
@@ -14501,11 +14585,11 @@ msgstr ""
 "Además, hemos hecho algunas elecciones de diseño que podrían incrementar "
 "las vulnerabilidades: "
 
-#: i2p2www/pages/site/docs/how/threat-model.html:268
+#: i2p2www/pages/site/docs/how/threat-model.html:331
 msgid "We do not use low-bandwidth \"guard nodes\""
 msgstr "No utilizamos \"nodos guardianes\" de bajo ancho de banda"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:271
+#: i2p2www/pages/site/docs/how/threat-model.html:334
 msgid ""
 "We use tunnel pools comprised of several tunnels, and traffic can shift "
 "from tunnel to tunnel."
@@ -14513,13 +14597,13 @@ msgstr ""
 "Usamos grupos de túneles compuestos de varios túneles, y el tráfico puede"
 " pasar de túnel a túnel."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:274
+#: i2p2www/pages/site/docs/how/threat-model.html:337
 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes."
 msgstr ""
 "Los túneles no son de larga duración; los túneles se recrean cada 10 "
 "minutos."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:277
+#: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
 "Tunnel lengths are configurable.\n"
 "While 3-hop tunnels are recommended for full protection, several "
@@ -14530,7 +14614,7 @@ msgstr ""
 "por túnel para protección total, algunas aplicaciones y servicios usan "
 "túneles de 2 saltos por defecto."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:284
+#: i2p2www/pages/site/docs/how/threat-model.html:347
 #, python-format
 msgid ""
 "In the future, it could\n"
@@ -14553,12 +14637,12 @@ msgstr ""
 "que un adversario no puede contactarles,\"ping\" them, para montar el "
 "ataque."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:293
+#: i2p2www/pages/site/docs/how/threat-model.html:356
 #, python-format
 msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>"
 msgstr "Referencia: <a href=\"%(oce)s\">One Cell Enough</a>"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:300
+#: i2p2www/pages/site/docs/how/threat-model.html:363
 msgid ""
 "There are a whole slew of denial of service attacks available against "
 "I2P,\n"
@@ -14567,7 +14651,7 @@ msgstr ""
 "Hay un montón de ataques de denegación de servicio disponibles contra "
 "I2P, cada cual con sus costes y consecuencias:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:305
+#: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
 "<b>Greedy user attack:</b> This is simply\n"
 "people trying to consume significantly more resources than they are \n"
@@ -14577,7 +14661,7 @@ msgstr ""
 " consumir muchas más recursos de los que están dispuestos a compartir. La"
 " defensa contra este ataque es:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:311
+#: i2p2www/pages/site/docs/how/threat-model.html:375
 #, python-format
 msgid ""
 "Set defaults so that most users provide resources to the network.\n"
@@ -14593,7 +14677,7 @@ msgstr ""
 "redes</a>, \n"
 "más del 95&#37; de los usuarios de I2P repiten tráfico para otros."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:317
+#: i2p2www/pages/site/docs/how/threat-model.html:381
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
 "contribution (share percentage) to the network. Display easy-to-"
@@ -14606,7 +14690,7 @@ msgstr ""
 "la red. Mostrar medidas fáciles de entender como \"el ratio de lo que se "
 "comparte\" para que los usuarios puedan ver lo que contribbuyen."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:322
+#: i2p2www/pages/site/docs/how/threat-model.html:386
 msgid ""
 "Maintain a strong community with blogs, forums, IRC, and other means of "
 "communication."
@@ -14614,7 +14698,7 @@ msgstr ""
 "Manteniendo una comunidad fuerte con blogs, foros, IRC y otras formas de "
 "comunicación."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:327
+#: i2p2www/pages/site/docs/how/threat-model.html:393
 #, python-format
 msgid ""
 "<b>Starvation attack:</b> A hostile user may attempt to harm the network "
@@ -14657,7 +14741,7 @@ msgstr ""
 " problemáticos; aún así todavía se requieren grandes esfuerzos en este "
 "área."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:344
+#: i2p2www/pages/site/docs/how/threat-model.html:413
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
@@ -14705,7 +14789,7 @@ msgstr ""
 "implemente el <a href=\"%(todo)s#batching\">funcionamiento avanzad de los"
 " túneles</a>)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:360
+#: i2p2www/pages/site/docs/how/threat-model.html:432
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
@@ -14727,7 +14811,7 @@ msgstr ""
 "ejemplo HashCash) puede mitigarse el problema, aunque hay posibilidad "
 "también de que un atacante explote algún error en la implementación."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:370
+#: i2p2www/pages/site/docs/how/threat-model.html:445
 #, python-format
 msgid ""
 "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
@@ -14752,7 +14836,7 @@ msgstr ""
 "así hay mucho por hacer todavía. Para más información vea la <a "
 "href=\"%(netdb)s#threat\">web de la base de datos de la red</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:386
+#: i2p2www/pages/site/docs/how/threat-model.html:464
 #, python-format
 msgid ""
 "Tagging attacks - modifying a message so that it can later be identified"
@@ -14791,7 +14875,7 @@ msgstr ""
 "entrada y en los de salida. Los atacantes externos tampoco pueden hacer "
 "nada, ya que los enlaces están cifrados y los mensajes firmados."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:402
+#: i2p2www/pages/site/docs/how/threat-model.html:482
 msgid ""
 "Partitioning attacks - finding ways to segregate (technically or "
 "analytically)\n"
@@ -14834,7 +14918,7 @@ msgstr ""
 " a estar inaccesibles, y alertar al cliente de que está temporalmente "
 "desconectado (este tipo de detección no está aún implementada)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:418
+#: i2p2www/pages/site/docs/how/threat-model.html:498
 #, python-format
 msgid ""
 "Partitioning the network analytically by looking for differences in how "
@@ -14880,7 +14964,7 @@ msgstr ""
 " parte de la red (y aún así sólo sería un ataque probabilístico, ya que "
 "no sabría que otros túneles o mensajes tienen esos retardos)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:434
+#: i2p2www/pages/site/docs/how/threat-model.html:514
 #, python-format
 msgid ""
 "Also discussed on the <a href=\"%(netdb)s#threat\">network database "
@@ -14889,7 +14973,7 @@ msgstr ""
 "También se discute en la <a href=\"%(netdb)s#threat\">página de la base "
 "de datos de la red</a> (ataque de bootstrap)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:440
+#: i2p2www/pages/site/docs/how/threat-model.html:522
 msgid ""
 "The predecessor attack is passively gathering statistics in an attempt to"
 " see\n"
@@ -14914,7 +14998,7 @@ msgstr ""
 " resto, y ese par podría llegar a estar donde el el objetivo se "
 "encuentra."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:450
+#: i2p2www/pages/site/docs/how/threat-model.html:532
 #, python-format
 msgid ""
 "I2P avoids this in four ways: first, the peers selected to participate in"
@@ -14954,7 +15038,7 @@ msgstr ""
 "será capaz de contactar con el objetivo, mientras que los atacantes "
 "simplemente pasarán por la puerta de salida."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:467
+#: i2p2www/pages/site/docs/how/threat-model.html:549
 #, python-format
 msgid ""
 "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n"
@@ -14966,7 +15050,7 @@ msgstr ""
 "predecesor. Ver también <a href=\"#intersection\">el ataque de "
 "interesección</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:473
+#: i2p2www/pages/site/docs/how/threat-model.html:555
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n"
@@ -14977,7 +15061,7 @@ msgstr ""
 "actualización del documento sobre el ataque del predecesor <a "
 "href=\"%(pdf2004)s\">%(pdf2004)s</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:482
+#: i2p2www/pages/site/docs/how/threat-model.html:567
 msgid ""
 "\"Harvesting\" means compiling a list of users running I2P.\n"
 "It can be used for legal attacks and to help\n"
@@ -14990,7 +15074,7 @@ msgstr ""
 "par, y cosechando todas las referencias que pueda encontrar sobre otros "
 "pares."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:489
+#: i2p2www/pages/site/docs/how/threat-model.html:574
 msgid ""
 "I2P itself is not designed with effective defenses against\n"
 "this attack, since there is the distributed network database \n"
@@ -15002,7 +15086,7 @@ msgstr ""
 "esta información. Aunque los siguientes factores hacen este ataque sea un"
 " poco más difícil en la práctica:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:496
+#: i2p2www/pages/site/docs/how/threat-model.html:581
 msgid ""
 "Network growth will make it more difficult to obtain a given proportion "
 "of the network"
@@ -15010,13 +15094,13 @@ msgstr ""
 "El crecimiento de la red hará más difícil el controlar una parte "
 "determinada de la red."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:499
+#: i2p2www/pages/site/docs/how/threat-model.html:584
 msgid "Floodfill routers implement query limits as DOS protection"
 msgstr ""
 "Los ruters floodfill implementan límites en las peticiones para prevenir "
 "ataques de denegación de servicio, DOS."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:502
+#: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
 "\"Hidden mode\", which prevents a router from publishing its information "
 "to the netDb,\n"
@@ -15026,7 +15110,7 @@ msgstr ""
 "\"Modo oculto\", evita que el ruter publique su información en la netDb, "
 "(pero también hace que no reenvíe datos), no se usa mucho por ahora."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:508
+#: i2p2www/pages/site/docs/how/threat-model.html:593
 #, python-format
 msgid ""
 "In future implementations,\n"
@@ -15047,7 +15131,7 @@ msgstr ""
 " túneles por los que puede ser cntactado (al igual que sus claves "
 "publicas y demás)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:517
+#: i2p2www/pages/site/docs/how/threat-model.html:602
 msgid ""
 "In the future, routers could use GeoIP to identify if they are in a "
 "particular\n"
@@ -15060,7 +15144,7 @@ msgstr ""
 "peligroso. En ese caso, el ruter podrá activar el modo oculto "
 "automáticamente, o utilizar otros métodos de enrutado restringidos."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:526
+#: i2p2www/pages/site/docs/how/threat-model.html:614
 #, python-format
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
@@ -15081,15 +15165,15 @@ msgstr ""
 "protocolos y la capa de transporte</a> hacen bastante difícil identificar"
 " el tráfico de I2P:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:536
+#: i2p2www/pages/site/docs/how/threat-model.html:624
 msgid "Random port selection"
 msgstr "Selección de puertos aleatoria"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:539
+#: i2p2www/pages/site/docs/how/threat-model.html:627
 msgid "Point-to-Point Encryption of all traffic"
 msgstr "Cifrado de todo el tráfico de punto a punto"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:542
+#: i2p2www/pages/site/docs/how/threat-model.html:630
 msgid ""
 "DH key exchange with no protocol bytes or other unencrypted constant "
 "fields"
@@ -15097,7 +15181,7 @@ msgstr ""
 "Intercambio de clave DH sin bytes del protocolo u otros campos constantes"
 " no cifrados"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:545
+#: i2p2www/pages/site/docs/how/threat-model.html:633
 #, python-format
 msgid ""
 "Simultaneous use of both\n"
@@ -15111,7 +15195,7 @@ msgstr ""
 "inspeccionar y seguir con equipamiento DPI, (inspección profunda de "
 "paquetes)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:553
+#: i2p2www/pages/site/docs/how/threat-model.html:641
 msgid ""
 "In the near future, we plan to directly address traffic analysis issues "
 "by further obfuscation of I2P transport protocols, possibly including:"
@@ -15120,7 +15204,7 @@ msgstr ""
 "trafico ofuscando los protocolos de transporte de I2P, probablemente "
 "incluyendo:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:557
+#: i2p2www/pages/site/docs/how/threat-model.html:645
 msgid ""
 "Padding at the transport layer to random lengths, especially during the "
 "connection handshake"
@@ -15128,7 +15212,7 @@ msgstr ""
 "Rellenando la capa de transporte para que tenga determinados tamaños, "
 "especialmente durante el handshake de conexión"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:560
+#: i2p2www/pages/site/docs/how/threat-model.html:648
 msgid ""
 "Study of packet size distribution signatures, and additional padding as "
 "necessary"
@@ -15136,7 +15220,7 @@ msgstr ""
 "Estudiando las firmas de la distribución de los tamaños de los paquetes, "
 "y rellenando si es necesario."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:563
+#: i2p2www/pages/site/docs/how/threat-model.html:651
 msgid ""
 "Development of additional transport methods that mimic SSL or other "
 "common protocols"
@@ -15144,7 +15228,7 @@ msgstr ""
 "Creación de otros métodos de transporte camuflados como SSL u otros "
 "protocolos comunes."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:566
+#: i2p2www/pages/site/docs/how/threat-model.html:654
 msgid ""
 "Review of padding strategies at higher layers to see how they affect "
 "packet sizes at the transport layer"
@@ -15152,7 +15236,7 @@ msgstr ""
 "Revisión de las estrategias de relleno en las capas superiores para ver "
 "como afectan al tamaño de los paquetes en la capa de transporte."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:569
+#: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
 "Review of methods implemented by various state-level firewalls to block "
 "Tor"
@@ -15160,13 +15244,13 @@ msgstr ""
 "Revisar varios métodos implementados por varios cortafuegos de algunos "
 "estados para bloquear Tor"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:572
+#: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid "Working directly with DPI and obfuscation experts"
 msgstr ""
 "Trabajar directamente con expertos en DPI, inspección profunda de "
 "paquetes, y expertos en ofuscación."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:577
+#: i2p2www/pages/site/docs/how/threat-model.html:665
 #, python-format
 msgid ""
 "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol "
@@ -15175,7 +15259,7 @@ msgstr ""
 "Referencia: <a href=\"%(pdf)s\">Breaking and Improving Protocol "
 "Obfuscation</a>"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:584
+#: i2p2www/pages/site/docs/how/threat-model.html:674
 msgid ""
 "Sybil describes a category of attacks where the adversary creates "
 "arbitrarily\n"
@@ -15228,15 +15312,15 @@ msgstr ""
 "certificado HashCash de un valor adecuado cuando sea necesario (o algún "
 "otro certificado que pruebe la escasez)."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:602
+#: i2p2www/pages/site/docs/how/threat-model.html:692
 msgid "Requiring HashCash Certificates in various places has two major problems:"
 msgstr "Requerir certificados HashCash en varios sitios tiene algunos problemas:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:606
+#: i2p2www/pages/site/docs/how/threat-model.html:696
 msgid "Maintaining backward compatibility"
 msgstr "Mantener compatibilidad con versiones anteriores"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:609
+#: i2p2www/pages/site/docs/how/threat-model.html:699
 msgid ""
 "The classic HashCash problem -\n"
 "selecting HashCash values that are meaningful proofs of work on high-end "
@@ -15248,7 +15332,7 @@ msgstr ""
 " que también sean factibles en máquinas no tan potentes como los "
 "dispositivos móviles."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:616
+#: i2p2www/pages/site/docs/how/threat-model.html:706
 msgid ""
 "Various limitations on the number of routers in a given IP range restrict"
 "\n"
@@ -15262,7 +15346,7 @@ msgstr ""
 "no pueden poner más computadoras en ese bloque de IPs. Aún así esto no es"
 " defensa contra un adversario con muchos recursos."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:623
+#: i2p2www/pages/site/docs/how/threat-model.html:713
 #, python-format
 msgid ""
 "See the <a href=\"%(netdb)s#threat\">network database page</a>\n"
@@ -15271,7 +15355,7 @@ msgstr ""
 "Vea la <a href=\"%(netdb)s#threat\">web de la base de datos de la red</a>"
 " para obtener más información sobre Sybil."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:630
+#: i2p2www/pages/site/docs/how/threat-model.html:723
 #, python-format
 msgid ""
 "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure "
@@ -15280,7 +15364,7 @@ msgstr ""
 "(Referencia: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure "
 "Lookup</a> Sección 5.2)"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:634
+#: i2p2www/pages/site/docs/how/threat-model.html:727
 #, python-format
 msgid ""
 "By refusing to accept or forward tunnel build requests, except to a "
@@ -15321,7 +15405,7 @@ msgstr ""
 "Podría \n"
 "ser necesaria ulterior investigación y defensa."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:653
+#: i2p2www/pages/site/docs/how/threat-model.html:748
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
@@ -15367,7 +15451,7 @@ msgstr ""
 "cambio del tamaño de las claves o los secretos compartidos, manteniendo "
 "la compatibilidad con versiones anteriores."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:672
+#: i2p2www/pages/site/docs/how/threat-model.html:767
 #, python-format
 msgid ""
 "Upgrading the various data structures and protocols to support longer "
@@ -15387,7 +15471,7 @@ msgstr ""
 "planteamiento podamos minimizar los trastornos e implementar mecanismos "
 "que hagan más fáciles futuros cambios."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:681
+#: i2p2www/pages/site/docs/how/threat-model.html:776
 msgid ""
 "In the future, several I2P protocols and data structures\n"
 "support securely padding messages to arbitrary sizes, so messages could "
@@ -15405,11 +15489,11 @@ msgstr ""
 "más subpartes de lo que realmente tienen. Hasta el momento los túneles "
 "garlic y los mensajes de fin a fin utilizan un simple relleno aleatorio."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:691
+#: i2p2www/pages/site/docs/how/threat-model.html:786
 msgid "Floodfill Anonymity attacks"
 msgstr "Ataques de anonimato FloodFill"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:692
+#: i2p2www/pages/site/docs/how/threat-model.html:790
 #, python-format
 msgid ""
 "In addition to the floodfill DOS attacks described\n"
@@ -15442,7 +15526,7 @@ msgstr ""
 "profundamente. Los ataques específicos potenciales y sus defensas deberán"
 " ser discutidos en estudios futuros."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:708
+#: i2p2www/pages/site/docs/how/threat-model.html:806
 #, python-format
 msgid ""
 "A hostile user may attempt to harm the network by\n"
@@ -15456,11 +15540,11 @@ msgstr ""
 "respondan. Varios escenarios como este han sido discutidos en la <a "
 "href=\"%(netdb)s#threat\">web de la base de datos de la red</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:718
+#: i2p2www/pages/site/docs/how/threat-model.html:816
 msgid "Central Resource Attacks"
 msgstr "Ataque de Recurso Central"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:719
+#: i2p2www/pages/site/docs/how/threat-model.html:820
 msgid ""
 "There are a few centralized or limited resources (some inside I2P, some "
 "not)\n"
@@ -15483,7 +15567,7 @@ msgstr ""
 "ataques a los servicios externos afectan mayormente a cómo los nuevos "
 "usuarios pueden encontrarnos, no en la operación de la red en sí misma."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:729
+#: i2p2www/pages/site/docs/how/threat-model.html:830
 #, python-format
 msgid ""
 "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
@@ -15492,7 +15576,7 @@ msgstr ""
 "La <a href=\"%(site)s\">web</a> tiene copias en varios lugares y usa "
 "round-robin DNS para el acceso público externo."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:732
+#: i2p2www/pages/site/docs/how/threat-model.html:833
 #, python-format
 msgid ""
 "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
@@ -15506,7 +15590,7 @@ msgstr ""
 "resiembra, y el manejo de los ruters maliciosos o no disponibles debería "
 "ser mejorado."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:737
+#: i2p2www/pages/site/docs/how/threat-model.html:838
 msgid ""
 "Routers now support multiple update file locations.\n"
 "A malicious update host could feed a huge file, need to limit the size."
@@ -15515,11 +15599,11 @@ msgstr ""
 "localizaciones. Un ruter malicioso de actualizaciones podría enviar un "
 "archivo enorme, se necesita limitar el tamaño."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:741
+#: i2p2www/pages/site/docs/how/threat-model.html:842
 msgid "Routers now support multiple default trusted update signers."
 msgstr "Los ruters ahora soportan múltiples actualizaciones de confianza firmadas."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:744
+#: i2p2www/pages/site/docs/how/threat-model.html:845
 msgid ""
 "Routers now better handle <a href=\"#ffdos\">multiple unreliable "
 "floodfill peers</a>.\n"
@@ -15530,7 +15614,7 @@ msgstr ""
 "múltiples no confiables</a>. Los FloodFills maliciosos <a "
 "href=\"#ffdos\">necesitan</a> <a href=\"#floodfill\">más</a> estudio."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:748
+#: i2p2www/pages/site/docs/how/threat-model.html:849
 #, python-format
 msgid ""
 "The code is now stored in a <a href=\"%(monotone)s\">distributed source "
@@ -15539,7 +15623,7 @@ msgstr ""
 "El cóodigo está ahora almacenado en un <a href=\"%(monotone)s\">sistema "
 "distribuido de control de código fuente</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:751
+#: i2p2www/pages/site/docs/how/threat-model.html:852
 msgid ""
 "Routers rely on a single news host, but there is a hardcoded backup URL "
 "pointing to a different host.\n"
@@ -15550,7 +15634,7 @@ msgstr ""
 "malicioso de noticias podría enviar un archivo enorme, se necesita "
 "limitar el tamaño."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:755
+#: i2p2www/pages/site/docs/how/threat-model.html:856
 #, python-format
 msgid ""
 "<a href=\"%(naming)s\">Naming system services</a>, including addressbook "
@@ -15570,7 +15654,7 @@ msgstr ""
 "dominios requieren algún cantidad de confianza, vea <a "
 "href=\"%(naming)s\">la web de dominios</a> para más detalles."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:762
+#: i2p2www/pages/site/docs/how/threat-model.html:863
 msgid ""
 "We remain reliant on the DNS service for i2p2.de, losing this would cause"
 " substantial\n"
@@ -15583,7 +15667,7 @@ msgstr ""
 "reduciría la red (de corto a medio plazo), al igual que lo hizo la "
 "pérdida de i2p.net."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:772
+#: i2p2www/pages/site/docs/how/threat-model.html:875
 msgid ""
 "These attacks aren't directly on the network, but instead go after its "
 "development team \n"
@@ -15607,11 +15691,11 @@ msgstr ""
 "denuncia con secreto de sumario para que no pueda contarlo, con amenaza "
 "de cárcel), podríamos tener un gran problema."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:781
+#: i2p2www/pages/site/docs/how/threat-model.html:884
 msgid "However, two techniques help defend against these attacks:"
 msgstr "Sin embargo, estas técnicas ayudan a defenderse contra estos ataques:"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:785
+#: i2p2www/pages/site/docs/how/threat-model.html:888
 #, python-format
 msgid ""
 "All components of the network must be open source to enable inspection, "
@@ -15636,7 +15720,7 @@ msgstr ""
 "sistema de listas de confianza para restringir las modificaciones a sólo "
 "aquellos que han sido aprovados."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:793
+#: i2p2www/pages/site/docs/how/threat-model.html:896
 #, python-format
 msgid ""
 "Development over the network itself, allowing developers to stay "
@@ -15656,7 +15740,7 @@ msgstr ""
 "discusión (forum.i2p), y webs de distribución de las aplicaciones, todo "
 "disponible dentro de I2P."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:804
+#: i2p2www/pages/site/docs/how/threat-model.html:907
 msgid ""
 "We also maintain relationships with various organizations that offer "
 "legal advice,\n"
@@ -15665,11 +15749,11 @@ msgstr ""
 "También mantenemos relaciones con organizaciones que ofrecen consejo "
 "legal, en caso de que fuese necesario algún tipo de defensa legal."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:809
+#: i2p2www/pages/site/docs/how/threat-model.html:912
 msgid "Implementation attacks (bugs)"
 msgstr "Ataques de implementación  (errores de programación)"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:810
+#: i2p2www/pages/site/docs/how/threat-model.html:916
 msgid ""
 "Try as we might, most nontrivial applications include errors in the "
 "design or \n"
@@ -15695,7 +15779,7 @@ msgstr ""
 " <a href=\"http://www.haystacknetwork.com/\">la seguridad por "
 "oscuridad</a>."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:821
+#: i2p2www/pages/site/docs/how/threat-model.html:927
 msgid ""
 "In addition, the code is being \n"
 "treated the same way, with little aversion towards reworking or throwing "
@@ -15718,7 +15802,7 @@ msgstr ""
 " ella sería raro que los programadores gastasen tanto tiempo en "
 "aprenderse el software como para identificar deficiencias y errores."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:831
+#: i2p2www/pages/site/docs/how/threat-model.html:937
 msgid ""
 "Our software is likely, in particular, to contain bugs related to denial "
 "of service\n"
@@ -15732,7 +15816,7 @@ msgstr ""
 " de memoria (OOMS), cross-site-scripting (XSS) en la consola del ruter, y"
 " otras vulnerabilidades no tan normales a causa de varios protocolos."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:837
+#: i2p2www/pages/site/docs/how/threat-model.html:943
 #, python-format
 msgid ""
 "I2P is still a small network with a small development community and "
@@ -15750,11 +15834,11 @@ msgstr ""
 "Continuamos reclutando gente para <a href=\"%(volunteer)s\">que se "
 "involucre</a> y ayude."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:850
+#: i2p2www/pages/site/docs/how/threat-model.html:956
 msgid "Blocklists"
 msgstr "Blocklists, lista de bloqueos"
 
-#: i2p2www/pages/site/docs/how/threat-model.html:851
+#: i2p2www/pages/site/docs/how/threat-model.html:957
 msgid ""
 "To some extent, I2P could be enhanced to avoid peers operating at IP "
 "addresses\n"
@@ -15768,7 +15852,7 @@ msgstr ""
 "varios formatos estándar, con listados de organizaciones contrarias a "
 "I2P, estados potencialmente peligrosos, y otros."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:857
+#: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
 "To the extent that active peers actually do show up in the actual "
 "blocklist,\n"
@@ -15783,7 +15867,7 @@ msgstr ""
 "general. Por lo cual queremos llegar aun acuerdo en una lista de bloqueo "
 "en particular y activarla por defecto."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:865
+#: i2p2www/pages/site/docs/how/threat-model.html:971
 msgid ""
 "Blocklists are only a part (perhaps a small part) of an array of defenses"
 "\n"
@@ -15801,7 +15885,7 @@ msgstr ""
 " de arriba hay mejoras que se pueden implementar para detectar la "
 "malicia."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:874
+#: i2p2www/pages/site/docs/how/threat-model.html:980
 msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
@@ -15816,7 +15900,7 @@ msgstr ""
 "automáticas a una lista ofrecen al proveedor la capacidad de apagar toda "
 "la red i2p. Completamente."
 
-#: i2p2www/pages/site/docs/how/threat-model.html:882
+#: i2p2www/pages/site/docs/how/threat-model.html:988
 msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
@@ -17517,10 +17601,6 @@ msgstr "Mensaje"
 msgid "Type"
 msgstr "Tipo"
 
-#: i2p2www/pages/site/docs/protocol/i2np.html:94
-msgid "Priority"
-msgstr "Prioridad"
-
 #: i2p2www/pages/site/docs/protocol/i2np.html:95
 msgid "Comments"
 msgstr "Comentarios"
diff --git a/i2p2www/translations/es/LC_MESSAGES/get-involved.po b/i2p2www/translations/es/LC_MESSAGES/get-involved.po
index 72d9250ae561eaf90b57e7ed4cf5ad78094a41c7..60230d0cd310f012cb836715f9149ca415105b72 100644
--- a/i2p2www/translations/es/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/es/LC_MESSAGES/get-involved.po
@@ -13,7 +13,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-17 03:30+0000\n"
 "Last-Translator: strel <strelnic@gmail.com>\n"
 "Language-Team: Spanish "
@@ -1571,29 +1571,29 @@ msgid "Current bounties"
 msgstr "Recompensas actuales"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Name"
 msgstr "Nombre"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Status"
 msgstr "Estado"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Judge"
 msgstr "Juez"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Dev"
 msgstr "Desarrolladores"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Bounty"
 msgstr "Recompensas"
 
@@ -1605,9 +1605,8 @@ msgstr "Frost para el almacenamiento de datos de I2P"
 #: i2p2www/pages/site/get-involved/bounties/index.html:40
 #: i2p2www/pages/site/get-involved/bounties/index.html:47
 #: i2p2www/pages/site/get-involved/bounties/index.html:54
-#: i2p2www/pages/site/get-involved/bounties/index.html:61
+#: i2p2www/pages/site/get-involved/bounties/index.html:75
 #: i2p2www/pages/site/get-involved/bounties/index.html:82
-#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Proposal in development"
 msgstr "Proposición en desarrollo"
 
@@ -1615,9 +1614,8 @@ msgstr "Proposición en desarrollo"
 #: i2p2www/pages/site/get-involved/bounties/index.html:42
 #: i2p2www/pages/site/get-involved/bounties/index.html:49
 #: i2p2www/pages/site/get-involved/bounties/index.html:56
-#: i2p2www/pages/site/get-involved/bounties/index.html:63
-#: i2p2www/pages/site/get-involved/bounties/index.html:84
-#: i2p2www/pages/site/get-involved/bounties/index.html:104
+#: i2p2www/pages/site/get-involved/bounties/index.html:77
+#: i2p2www/pages/site/get-involved/bounties/index.html:97
 msgid "vacant"
 msgstr "vacante"
 
@@ -1630,49 +1628,49 @@ msgid "Backporting Phex code onto I2PHex"
 msgstr "Portar el código de Phex dentro de I2PHex"
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:53
-msgid "Make I2P IPv6 native"
-msgstr "Hacer I2P IPV6 nativo"
-
-#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "I2P package in Debian and Ubuntu mirrors"
 msgstr "Paquetes I2P disponibles en los repositorios de Debian y Ubuntu"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:67
+#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "Bitcoin client for I2P"
 msgstr "Cliente Bitcoin para I2P"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:68
+#: i2p2www/pages/site/get-involved/bounties/index.html:61
 msgid "Done, phase of verification"
 msgstr "Hecho, fase de verificación"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:74
+#: i2p2www/pages/site/get-involved/bounties/index.html:67
 msgid "Unit tests and Multi-router Simulation"
 msgstr "Unit tests y simulación multi-tuter"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:75
+#: i2p2www/pages/site/get-involved/bounties/index.html:68
 msgid "Partly done, partly in work, partly still open"
 msgstr "Parcialmente hecho, parcialmente trabajando, parcialmente aún abierto"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:96
+#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding"
 msgstr "Recompensas paradas, paradas a causa de la desaparición de jrandom."
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:101
+#: i2p2www/pages/site/get-involved/bounties/index.html:94
 msgid "Bundling bounties"
 msgstr "Ordenando las recompensas"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:102
+#: i2p2www/pages/site/get-involved/bounties/index.html:95
 msgid "Proposed"
 msgstr "Propuesto"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:109
+#: i2p2www/pages/site/get-involved/bounties/index.html:102
 msgid "Claimed bounties"
 msgstr "Recompensas reclamadas"
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Dev team"
 msgstr "Equipo de desarrollo"
 
+#: i2p2www/pages/site/get-involved/bounties/index.html:107
+msgid "Make I2P IPv6 native"
+msgstr "Hacer I2P IPV6 nativo"
+
 #: i2p2www/pages/site/get-involved/bounties/index.html:114
 msgid "Setting up a SILC server"
 msgstr "Configurar un servidor SILC"
@@ -1734,7 +1732,7 @@ msgstr ""
 "ruters de I2P deben funcionar nativa y completamente con conexiones IPv6 "
 "como lo hacen con conexiones IPv4."
 
-#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15
+#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17
 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
 msgid ""
 "For bounties to be declared done and paid, we need the plugin AND the "
diff --git a/i2p2www/translations/es/LC_MESSAGES/priority.po b/i2p2www/translations/es/LC_MESSAGES/priority.po
index b4a42fac3d50edc9fd41eed1c54e4e16dd420ea6..ff8aed69a51f4b4ccdfd21480304065dc64d333f 100644
--- a/i2p2www/translations/es/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/es/LC_MESSAGES/priority.po
@@ -13,7 +13,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-19 14:19+0000\n"
 "Last-Translator: trolly\n"
 "Language-Team: Spanish "
@@ -3321,22 +3321,26 @@ msgstr ""
 "vídeos, y manuales sobre I2P</a>."
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr "Amigos de I2P"
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr "Más proyectos y documentación"
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr "Prensa"
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr "Anuncios, noticias y otros"
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr "Cosas muy antiguas"
 
diff --git a/i2p2www/translations/fr/LC_MESSAGES/blog.po b/i2p2www/translations/fr/LC_MESSAGES/blog.po
index 04a0281cd48535300d2e6eb85550d794945bda2f..0f4d04b5cd5fd3458ab337626aa51d165d586a42 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/blog.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-08-12 10:32+0000\n"
 "Last-Translator: str4d <str4d@i2pmail.org>\n"
 "Language-Team: French "
@@ -63,6 +63,7 @@ msgstr "`download page`"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101
 msgid "RELEASE DETAILS"
 msgstr "DETAILS SUR CETTE VERSION"
 
@@ -74,6 +75,7 @@ msgstr "DETAILS SUR CETTE VERSION"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103
 msgid "Major Changes"
 msgstr "Changements majeurs"
 
@@ -89,6 +91,7 @@ msgstr "Changements majeurs"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112
 msgid "Bug Fixes"
 msgstr "Corrections de bugs"
 
@@ -106,6 +109,7 @@ msgstr "Corrections de bugs"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118
 msgid "Other"
 msgstr "Autre"
 
@@ -123,6 +127,7 @@ msgstr "Autre"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129
 msgid "SHA256 Checksums:"
 msgstr "Sommes de contrôle SHA256 :"
 
@@ -253,6 +258,7 @@ msgstr ""
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127
 msgid "Update GeoIP data (new installs and PPA only)"
 msgstr "Mise à jour données GeoIP (nouvelles installations et PPA seulement)"
 
@@ -929,6 +935,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107
 msgid "Anonymity Improvements"
 msgstr ""
 
@@ -1083,3 +1090,207 @@ msgstr ""
 msgid "UPnP fix for some hardware"
 msgstr ""
 
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2
+#, fuzzy
+msgid "0.9.8 Release"
+msgstr "Release 0.9.4"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
+msgid ""
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
+#, python-format
+msgid "30% of you will update via in-network torrent in this update cycle."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
+msgid "IPv6 Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
+msgid ""
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
+"the router console. If IPv6 is causing problems you may disable it there."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
+msgid ""
+"As a part of the IPv6 development effort, I2P now supports multiple \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
+"it if necessary.\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
+"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
+"bugs still to be fixed with multiple addresses of each type."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
+msgid ""
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
+"and disable it necessary. Please report any bugs on \n"
+"http://trac.i2p2.i2p."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42
+msgid "Rekeying Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
+msgid ""
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
+"torrent updates, and the recent network growth, we expect substantial \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
+"Please be patient and things should start to improve after a few days."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
+msgid ""
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
+"computation. Performance may also be poor during the first week\n"
+"due to the network churn.\n"
+"We will evaluate the network performace before deciding whether to\n"
+"change the key length on slower hardware in a future release."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
+msgid ""
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
+"network is still performing fairly well, so keep spreading the word."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69
+msgid "More Changes Coming"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71
+msgid ""
+"We're in the initial stages of desiging major changes to strengthen our \n"
+"crypto. Stronger crypto will use more CPU and it may possibly \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
+"minimum requirements will be announced well in advance."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81
+msgid "New Website"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83
+msgid ""
+"After a heroic effort by str4d, the new website preview is available at \n"
+"http://i2hq.srv.i2p2.de. We hope to see it go live at \n"
+"https://geti2p.net and http://www.i2p2.i2p soon.  Please \n"
+"contribute to the new website translations on Transifex, especially the \n"
+"website_priority resource."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
+msgid "Community Participation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93
+msgid ""
+"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n"
+"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
+"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
+"Several of us will be at 30C3 in Hamburg late this year.\n"
+"It's great to see people participating at these events and representing "
+"I2P."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
+msgid "IPv6 support for both NTCP and SSU"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109
+msgid "SSU protocol obfuscation by adding random padding"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110
+msgid "Longer encryption and DH private keys for users on faster platforms"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114
+msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115
+msgid "Fix translation of HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116
+msgid "Fix occasional runtime exception in NTCP"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
+msgid "Streaming: Improved recovery from lost acks, other fixes"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
+#, fuzzy
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr "Mises à jour de traduction : Italien, Portugais, Espagnol, Suédois"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
+msgid "New Romanian translation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126
+#, fuzzy
+msgid "Wrapper 3.5.20 (new installs and PPA only)"
+msgstr "Mise à jour données GeoIP (nouvelles installations et PPA seulement)"
+
diff --git a/i2p2www/translations/fr/LC_MESSAGES/docs.po b/i2p2www/translations/fr/LC_MESSAGES/docs.po
index 4c5e65c3cd552f4bc0a4263aad527cd0f5bf5757..baeb749c7f6d4bd6cf9b70e10629b1a60caba001 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/docs.po
@@ -10,7 +10,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-30 15:19+0000\n"
 "Last-Translator: Towatowa441\n"
 "Language-Team: French "
@@ -10210,11 +10210,57 @@ msgstr ""
 msgid "November 2010"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:6
-msgid "What do we mean by \"anonymous\"?"
+#: i2p2www/pages/site/docs/how/threat-model.html:7
+msgid "low"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:8
+msgid "medium"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:9
+msgid "high"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:34
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "Damage Potential"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:35
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "Reliability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:36
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "Exploitability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:37
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "Affected Users"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:38
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "Discoverability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:39
+msgid "Severity"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:40
+#: i2p2www/pages/site/docs/protocol/i2np.html:94
+msgid "Priority"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:45
+msgid "What do we mean by \"anonymous\"?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:47
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
 "to find out information you don't want them to know?\" - who you are, "
@@ -10232,7 +10278,7 @@ msgid ""
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:19
+#: i2p2www/pages/site/docs/how/threat-model.html:58
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
@@ -10241,7 +10287,7 @@ msgid ""
 "so that you may decide whether it meets your needs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:26
+#: i2p2www/pages/site/docs/how/threat-model.html:65
 msgid ""
 "We welcome further research and analysis on I2P's resistance to the "
 "threats described below.\n"
@@ -10250,11 +10296,11 @@ msgid ""
 "work focused on I2P is needed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:32
+#: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid "Network Topology Summary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:33
+#: i2p2www/pages/site/docs/how/threat-model.html:72
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
@@ -10263,7 +10309,7 @@ msgid ""
 "reviewing related literature:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:39
+#: i2p2www/pages/site/docs/how/threat-model.html:78
 msgid ""
 "<b>I2P is a free route mixnet</b> - the message creator explicitly "
 "defines the\n"
@@ -10274,7 +10320,7 @@ msgid ""
 "inbound tunnel)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:45
+#: i2p2www/pages/site/docs/how/threat-model.html:84
 msgid ""
 "<b>I2P has no official entry and exit points</b> - all peers fully "
 "participate in the \n"
@@ -10282,7 +10328,7 @@ msgid ""
 "application layer, a few proxies do exist)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:50
+#: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
 "<b>I2P is fully distributed</b> - there are no central controls or "
 "authorities.\n"
@@ -10297,7 +10343,7 @@ msgid ""
 "anonymity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:60
+#: i2p2www/pages/site/docs/how/threat-model.html:99
 #, python-format
 msgid ""
 "We have documented plans to implement <a "
@@ -10316,7 +10362,7 @@ msgid ""
 "delay features."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:71
+#: i2p2www/pages/site/docs/how/threat-model.html:110
 msgid ""
 "In theory, routers along the message path may inject an \n"
 "arbitrary number of hops before forwarding the message to the next peer, "
@@ -10324,11 +10370,11 @@ msgid ""
 "the current implementation does not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:78
-msgid "The Threat Model (Attacks)"
+#: i2p2www/pages/site/docs/how/threat-model.html:117
+msgid "The Threat Model"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:79
+#: i2p2www/pages/site/docs/how/threat-model.html:118
 msgid ""
 "I2P design started in 2003, not long after the advent of\n"
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
@@ -10340,7 +10386,7 @@ msgid ""
 "from the significant academic interest in Tor."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:89
+#: i2p2www/pages/site/docs/how/threat-model.html:128
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
 "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
@@ -10353,14 +10399,14 @@ msgid ""
 "this list to include new attacks as they are identified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:98
+#: i2p2www/pages/site/docs/how/threat-model.html:137
 msgid ""
 "Included are some attacks that may be unique to I2P.\n"
 "We do not have good answers for all these attacks, however\n"
 "we continue to do research and improve our defenses."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:104
+#: i2p2www/pages/site/docs/how/threat-model.html:143
 msgid ""
 "In addition, many of these attacks are significantly easier than\n"
 "they should be, due to the modest size of the current network.\n"
@@ -10371,7 +10417,7 @@ msgid ""
 "these attacks will become much harder."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:114
+#: i2p2www/pages/site/docs/how/threat-model.html:153
 #, python-format
 msgid ""
 "The\n"
@@ -10381,98 +10427,133 @@ msgid ""
 "to review."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:121
-msgid "Index"
-msgstr "Index"
+#: i2p2www/pages/site/docs/how/threat-model.html:160
+#, python-format
+msgid ""
+"Attacks are judged using the <a href=\"%(DREAD)s\">modified "
+"<strong>DREAD</strong> model</a>:"
+msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:123
-#: i2p2www/pages/site/docs/how/threat-model.html:143
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "If a threat exploit occurs, how much damage will be caused?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "How reliable is the attack?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "What is needed to exploit this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "How many users will be affected?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "How easy is it to discover this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:172
+#, python-format
+msgid ""
+"Each category is given a rating of low, medium or high. The severity\n"
+"and priority scores are calculated using the equations outlined\n"
+"<a href=\"%(DREAD)s\">here</a>."
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:178
+msgid "Index of Attacks"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:180
+#: i2p2www/pages/site/docs/how/threat-model.html:200
 msgid "Brute force attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:124
-#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:181
+#: i2p2www/pages/site/docs/how/threat-model.html:244
 msgid "Timing attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:125
-#: i2p2www/pages/site/docs/how/threat-model.html:220
+#: i2p2www/pages/site/docs/how/threat-model.html:182
+#: i2p2www/pages/site/docs/how/threat-model.html:281
 msgid "Intersection attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:126
-#: i2p2www/pages/site/docs/how/threat-model.html:298
+#: i2p2www/pages/site/docs/how/threat-model.html:183
+#: i2p2www/pages/site/docs/how/threat-model.html:361
 msgid "Denial of service attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:127
-#: i2p2www/pages/site/docs/how/threat-model.html:385
+#: i2p2www/pages/site/docs/how/threat-model.html:184
+#: i2p2www/pages/site/docs/how/threat-model.html:460
 msgid "Tagging attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:128
-#: i2p2www/pages/site/docs/how/threat-model.html:400
+#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:478
 msgid "Partitioning attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:129
-#: i2p2www/pages/site/docs/how/threat-model.html:438
+#: i2p2www/pages/site/docs/how/threat-model.html:186
+#: i2p2www/pages/site/docs/how/threat-model.html:518
 msgid "Predecessor attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:130
-#: i2p2www/pages/site/docs/how/threat-model.html:481
+#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:563
 msgid "Harvesting attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:131
-#: i2p2www/pages/site/docs/how/threat-model.html:525
+#: i2p2www/pages/site/docs/how/threat-model.html:188
+#: i2p2www/pages/site/docs/how/threat-model.html:610
 msgid "Identification Through Traffic Analysis"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:132
-#: i2p2www/pages/site/docs/how/threat-model.html:582
+#: i2p2www/pages/site/docs/how/threat-model.html:189
+#: i2p2www/pages/site/docs/how/threat-model.html:670
 msgid "Sybil attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:133
-#: i2p2www/pages/site/docs/how/threat-model.html:629
+#: i2p2www/pages/site/docs/how/threat-model.html:190
+#: i2p2www/pages/site/docs/how/threat-model.html:719
 msgid "Buddy Exhaustion attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:134
-#: i2p2www/pages/site/docs/how/threat-model.html:651
+#: i2p2www/pages/site/docs/how/threat-model.html:191
+#: i2p2www/pages/site/docs/how/threat-model.html:744
 msgid "Cryptographic attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:135
+#: i2p2www/pages/site/docs/how/threat-model.html:192
 msgid "Floodfill attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:136
-#: i2p2www/pages/site/docs/how/threat-model.html:707
+#: i2p2www/pages/site/docs/how/threat-model.html:193
+#: i2p2www/pages/site/docs/how/threat-model.html:805
 msgid "Other Network Database attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:137
+#: i2p2www/pages/site/docs/how/threat-model.html:194
 msgid "Attacks on centralized resources"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:138
-#: i2p2www/pages/site/docs/how/threat-model.html:770
+#: i2p2www/pages/site/docs/how/threat-model.html:195
+#: i2p2www/pages/site/docs/how/threat-model.html:871
 msgid "Development attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:139
+#: i2p2www/pages/site/docs/how/threat-model.html:196
 msgid "Implementation attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:140
-#: i2p2www/pages/site/docs/how/threat-model.html:849
+#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:955
 msgid "Other Defenses"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:145
+#: i2p2www/pages/site/docs/how/threat-model.html:204
 msgid ""
 "A brute force attack can be mounted by a global passive or active "
 "adversary, \n"
@@ -10493,7 +10574,7 @@ msgid ""
 "message)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:157
+#: i2p2www/pages/site/docs/how/threat-model.html:216
 msgid ""
 "However, a powerful attacker can use brute force to detect trends - if "
 "they \n"
@@ -10520,7 +10601,7 @@ msgid ""
 "not currently implemented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:174
+#: i2p2www/pages/site/docs/how/threat-model.html:233
 #, python-format
 msgid ""
 "As a partial defense against a single router or group of routers trying "
@@ -10533,7 +10614,7 @@ msgid ""
 "<a href=\"%(peerselection)s\">peer selection page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:248
 msgid ""
 "I2P's messages are unidirectional and do not necessarily imply that a "
 "reply\n"
@@ -10549,7 +10630,7 @@ msgid ""
 "slow to have passed the message along."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:258
 msgid ""
 "This sort of attack is powerful, but its applicability to I2P is non "
 "obvious,\n"
@@ -10567,7 +10648,7 @@ msgid ""
 "DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:207
+#: i2p2www/pages/site/docs/how/threat-model.html:268
 #, python-format
 msgid ""
 "Without protocol scrubbing or higher latency, global active adversaries "
@@ -10583,14 +10664,14 @@ msgid ""
 "but these are unimplemented in I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:216
+#: i2p2www/pages/site/docs/how/threat-model.html:277
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against "
 "Anonymous Systems</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:222
+#: i2p2www/pages/site/docs/how/threat-model.html:285
 msgid ""
 "Intersection attacks against low latency systems are extremely powerful -"
 "\n"
@@ -10606,7 +10687,7 @@ msgid ""
 "scenarios."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:232
+#: i2p2www/pages/site/docs/how/threat-model.html:295
 #, python-format
 msgid ""
 "In summary, if an attacker is at both ends of your tunnel at the same "
@@ -10617,61 +10698,61 @@ msgid ""
 "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:240
+#: i2p2www/pages/site/docs/how/threat-model.html:303
 msgid "Partial defenses implemented in I2P:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:244
+#: i2p2www/pages/site/docs/how/threat-model.html:307
 #, python-format
 msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:247
+#: i2p2www/pages/site/docs/how/threat-model.html:310
 #, python-format
 msgid ""
 "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
 "small group that changes slowly"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:250
+#: i2p2www/pages/site/docs/how/threat-model.html:313
 msgid "Limits on the number of tunnels routed through a single peer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:253
+#: i2p2www/pages/site/docs/how/threat-model.html:316
 msgid ""
 "Prevention of peers from the same /16 IP range from being members of a "
 "single tunnel"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:256
+#: i2p2www/pages/site/docs/how/threat-model.html:319
 msgid ""
 "For eepsites or other hosted services, we support\n"
 "simultaneous hosting on multiple routers, or\n"
 "<a href=\"#intersection\">multihoming</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:263
+#: i2p2www/pages/site/docs/how/threat-model.html:326
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
 "Also, we have made some design choices that may significantly increase "
 "our vulnerability:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:268
+#: i2p2www/pages/site/docs/how/threat-model.html:331
 msgid "We do not use low-bandwidth \"guard nodes\""
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:271
+#: i2p2www/pages/site/docs/how/threat-model.html:334
 msgid ""
 "We use tunnel pools comprised of several tunnels, and traffic can shift "
 "from tunnel to tunnel."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:274
+#: i2p2www/pages/site/docs/how/threat-model.html:337
 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:277
+#: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
 "Tunnel lengths are configurable.\n"
 "While 3-hop tunnels are recommended for full protection, several "
@@ -10679,7 +10760,7 @@ msgid ""
 "services use 2-hop tunnels by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:284
+#: i2p2www/pages/site/docs/how/threat-model.html:347
 #, python-format
 msgid ""
 "In the future, it could\n"
@@ -10694,26 +10775,26 @@ msgid ""
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:293
+#: i2p2www/pages/site/docs/how/threat-model.html:356
 #, python-format
 msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:300
+#: i2p2www/pages/site/docs/how/threat-model.html:363
 msgid ""
 "There are a whole slew of denial of service attacks available against "
 "I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:305
+#: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
 "<b>Greedy user attack:</b> This is simply\n"
 "people trying to consume significantly more resources than they are \n"
 "willing to contribute. The defense against this is:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:311
+#: i2p2www/pages/site/docs/how/threat-model.html:375
 #, python-format
 msgid ""
 "Set defaults so that most users provide resources to the network.\n"
@@ -10722,7 +10803,7 @@ msgid ""
 "over 95&#37; of I2P users relay traffic for others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:317
+#: i2p2www/pages/site/docs/how/threat-model.html:381
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
 "contribution (share percentage) to the network. Display easy-to-"
@@ -10731,13 +10812,13 @@ msgid ""
 "contributing."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:322
+#: i2p2www/pages/site/docs/how/threat-model.html:386
 msgid ""
 "Maintain a strong community with blogs, forums, IRC, and other means of "
 "communication."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:327
+#: i2p2www/pages/site/docs/how/threat-model.html:393
 #, python-format
 msgid ""
 "<b>Starvation attack:</b> A hostile user may attempt to harm the network "
@@ -10766,7 +10847,7 @@ msgid ""
 "significant efforts required in this area."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:344
+#: i2p2www/pages/site/docs/how/threat-model.html:413
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
@@ -10797,7 +10878,7 @@ msgid ""
 "operation</a> is implemented)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:360
+#: i2p2www/pages/site/docs/how/threat-model.html:432
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
@@ -10812,7 +10893,7 @@ msgid ""
 "bugs in the implementation."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:370
+#: i2p2www/pages/site/docs/how/threat-model.html:445
 #, python-format
 msgid ""
 "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
@@ -10828,7 +10909,7 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:386
+#: i2p2www/pages/site/docs/how/threat-model.html:464
 #, python-format
 msgid ""
 "Tagging attacks - modifying a message so that it can later be identified"
@@ -10854,7 +10935,7 @@ msgid ""
 "as the links are encrypted and messages signed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:402
+#: i2p2www/pages/site/docs/how/threat-model.html:482
 msgid ""
 "Partitioning attacks - finding ways to segregate (technically or "
 "analytically)\n"
@@ -10883,7 +10964,7 @@ msgid ""
 "the moment)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:418
+#: i2p2www/pages/site/docs/how/threat-model.html:498
 #, python-format
 msgid ""
 "Partitioning the network analytically by looking for differences in how "
@@ -10913,14 +10994,14 @@ msgid ""
 "which other tunnels or messages have those delays)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:434
+#: i2p2www/pages/site/docs/how/threat-model.html:514
 #, python-format
 msgid ""
 "Also discussed on the <a href=\"%(netdb)s#threat\">network database "
 "page</a> (bootstrap attack)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:440
+#: i2p2www/pages/site/docs/how/threat-model.html:522
 msgid ""
 "The predecessor attack is passively gathering statistics in an attempt to"
 " see\n"
@@ -10937,7 +11018,7 @@ msgid ""
 "target is located."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:450
+#: i2p2www/pages/site/docs/how/threat-model.html:532
 #, python-format
 msgid ""
 "I2P avoids this in four ways: first, the peers selected to participate in"
@@ -10962,7 +11043,7 @@ msgid ""
 "attackers will merely run into that gateway."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:467
+#: i2p2www/pages/site/docs/how/threat-model.html:549
 #, python-format
 msgid ""
 "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n"
@@ -10970,7 +11051,7 @@ msgid ""
 "See also <a href=\"#intersection\">the intersection attack</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:473
+#: i2p2www/pages/site/docs/how/threat-model.html:555
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n"
@@ -10978,7 +11059,7 @@ msgid ""
 "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:482
+#: i2p2www/pages/site/docs/how/threat-model.html:567
 msgid ""
 "\"Harvesting\" means compiling a list of users running I2P.\n"
 "It can be used for legal attacks and to help\n"
@@ -10986,7 +11067,7 @@ msgid ""
 "harvesting whatever references to other peers it can find."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:489
+#: i2p2www/pages/site/docs/how/threat-model.html:574
 msgid ""
 "I2P itself is not designed with effective defenses against\n"
 "this attack, since there is the distributed network database \n"
@@ -10994,17 +11075,17 @@ msgid ""
 "The following factors make the attack somewhat harder in practice:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:496
+#: i2p2www/pages/site/docs/how/threat-model.html:581
 msgid ""
 "Network growth will make it more difficult to obtain a given proportion "
 "of the network"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:499
+#: i2p2www/pages/site/docs/how/threat-model.html:584
 msgid "Floodfill routers implement query limits as DOS protection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:502
+#: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
 "\"Hidden mode\", which prevents a router from publishing its information "
 "to the netDb,\n"
@@ -11012,7 +11093,7 @@ msgid ""
 "could be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:508
+#: i2p2www/pages/site/docs/how/threat-model.html:593
 #, python-format
 msgid ""
 "In future implementations,\n"
@@ -11026,7 +11107,7 @@ msgid ""
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:517
+#: i2p2www/pages/site/docs/how/threat-model.html:602
 msgid ""
 "In the future, routers could use GeoIP to identify if they are in a "
 "particular\n"
@@ -11035,7 +11116,7 @@ msgid ""
 "enact other restricted route methods."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:526
+#: i2p2www/pages/site/docs/how/threat-model.html:614
 #, python-format
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
@@ -11049,21 +11130,21 @@ msgid ""
 "make it somewhat difficult to identify I2P traffic:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:536
+#: i2p2www/pages/site/docs/how/threat-model.html:624
 msgid "Random port selection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:539
+#: i2p2www/pages/site/docs/how/threat-model.html:627
 msgid "Point-to-Point Encryption of all traffic"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:542
+#: i2p2www/pages/site/docs/how/threat-model.html:630
 msgid ""
 "DH key exchange with no protocol bytes or other unencrypted constant "
 "fields"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:545
+#: i2p2www/pages/site/docs/how/threat-model.html:633
 #, python-format
 msgid ""
 "Simultaneous use of both\n"
@@ -11073,54 +11154,54 @@ msgid ""
 " track."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:553
+#: i2p2www/pages/site/docs/how/threat-model.html:641
 msgid ""
 "In the near future, we plan to directly address traffic analysis issues "
 "by further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:557
+#: i2p2www/pages/site/docs/how/threat-model.html:645
 msgid ""
 "Padding at the transport layer to random lengths, especially during the "
 "connection handshake"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:560
+#: i2p2www/pages/site/docs/how/threat-model.html:648
 msgid ""
 "Study of packet size distribution signatures, and additional padding as "
 "necessary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:563
+#: i2p2www/pages/site/docs/how/threat-model.html:651
 msgid ""
 "Development of additional transport methods that mimic SSL or other "
 "common protocols"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:566
+#: i2p2www/pages/site/docs/how/threat-model.html:654
 msgid ""
 "Review of padding strategies at higher layers to see how they affect "
 "packet sizes at the transport layer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:569
+#: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
 "Review of methods implemented by various state-level firewalls to block "
 "Tor"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:572
+#: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid "Working directly with DPI and obfuscation experts"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:577
+#: i2p2www/pages/site/docs/how/threat-model.html:665
 #, python-format
 msgid ""
 "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol "
 "Obfuscation</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:584
+#: i2p2www/pages/site/docs/how/threat-model.html:674
 msgid ""
 "Sybil describes a category of attacks where the adversary creates "
 "arbitrarily\n"
@@ -11150,15 +11231,15 @@ msgid ""
 "scarcity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:602
+#: i2p2www/pages/site/docs/how/threat-model.html:692
 msgid "Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:606
+#: i2p2www/pages/site/docs/how/threat-model.html:696
 msgid "Maintaining backward compatibility"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:609
+#: i2p2www/pages/site/docs/how/threat-model.html:699
 msgid ""
 "The classic HashCash problem -\n"
 "selecting HashCash values that are meaningful proofs of work on high-end "
@@ -11166,7 +11247,7 @@ msgid ""
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:616
+#: i2p2www/pages/site/docs/how/threat-model.html:706
 msgid ""
 "Various limitations on the number of routers in a given IP range restrict"
 "\n"
@@ -11176,21 +11257,21 @@ msgid ""
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:623
+#: i2p2www/pages/site/docs/how/threat-model.html:713
 #, python-format
 msgid ""
 "See the <a href=\"%(netdb)s#threat\">network database page</a>\n"
 "for more Sybil discussion."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:630
+#: i2p2www/pages/site/docs/how/threat-model.html:723
 #, python-format
 msgid ""
 "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure "
 "Lookup</a> Section 5.2)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:634
+#: i2p2www/pages/site/docs/how/threat-model.html:727
 #, python-format
 msgid ""
 "By refusing to accept or forward tunnel build requests, except to a "
@@ -11213,7 +11294,7 @@ msgid ""
 "Further research and defenses may be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:653
+#: i2p2www/pages/site/docs/how/threat-model.html:748
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
@@ -11241,7 +11322,7 @@ msgid ""
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:672
+#: i2p2www/pages/site/docs/how/threat-model.html:767
 #, python-format
 msgid ""
 "Upgrading the various data structures and protocols to support longer "
@@ -11254,7 +11335,7 @@ msgid ""
 "implement mechanisms to make it easier for future transitions."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:681
+#: i2p2www/pages/site/docs/how/threat-model.html:776
 msgid ""
 "In the future, several I2P protocols and data structures\n"
 "support securely padding messages to arbitrary sizes, so messages could "
@@ -11266,11 +11347,11 @@ msgid ""
 "end to end messages include simple random padding."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:691
+#: i2p2www/pages/site/docs/how/threat-model.html:786
 msgid "Floodfill Anonymity attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:692
+#: i2p2www/pages/site/docs/how/threat-model.html:790
 #, python-format
 msgid ""
 "In addition to the floodfill DOS attacks described\n"
@@ -11290,7 +11371,7 @@ msgid ""
 " future research."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:708
+#: i2p2www/pages/site/docs/how/threat-model.html:806
 #, python-format
 msgid ""
 "A hostile user may attempt to harm the network by\n"
@@ -11300,11 +11381,11 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:718
+#: i2p2www/pages/site/docs/how/threat-model.html:816
 msgid "Central Resource Attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:719
+#: i2p2www/pages/site/docs/how/threat-model.html:820
 msgid ""
 "There are a few centralized or limited resources (some inside I2P, some "
 "not)\n"
@@ -11319,14 +11400,14 @@ msgid ""
 "not the operation of the network itself."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:729
+#: i2p2www/pages/site/docs/how/threat-model.html:830
 #, python-format
 msgid ""
 "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
 " for external public access."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:732
+#: i2p2www/pages/site/docs/how/threat-model.html:833
 #, python-format
 msgid ""
 "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
@@ -11336,17 +11417,17 @@ msgid ""
 "reseed hosts may need improvement."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:737
+#: i2p2www/pages/site/docs/how/threat-model.html:838
 msgid ""
 "Routers now support multiple update file locations.\n"
 "A malicious update host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:741
+#: i2p2www/pages/site/docs/how/threat-model.html:842
 msgid "Routers now support multiple default trusted update signers."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:744
+#: i2p2www/pages/site/docs/how/threat-model.html:845
 msgid ""
 "Routers now better handle <a href=\"#ffdos\">multiple unreliable "
 "floodfill peers</a>.\n"
@@ -11354,21 +11435,21 @@ msgid ""
 "href=\"#floodfill\">more</a> study."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:748
+#: i2p2www/pages/site/docs/how/threat-model.html:849
 #, python-format
 msgid ""
 "The code is now stored in a <a href=\"%(monotone)s\">distributed source "
 "control system</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:751
+#: i2p2www/pages/site/docs/how/threat-model.html:852
 msgid ""
 "Routers rely on a single news host, but there is a hardcoded backup URL "
 "pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:755
+#: i2p2www/pages/site/docs/how/threat-model.html:856
 #, python-format
 msgid ""
 "<a href=\"%(naming)s\">Naming system services</a>, including addressbook "
@@ -11381,7 +11462,7 @@ msgid ""
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:762
+#: i2p2www/pages/site/docs/how/threat-model.html:863
 msgid ""
 "We remain reliant on the DNS service for i2p2.de, losing this would cause"
 " substantial\n"
@@ -11390,7 +11471,7 @@ msgid ""
 "loss of i2p.net did."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:772
+#: i2p2www/pages/site/docs/how/threat-model.html:875
 msgid ""
 "These attacks aren't directly on the network, but instead go after its "
 "development team \n"
@@ -11406,11 +11487,11 @@ msgid ""
 "have a big problem."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:781
+#: i2p2www/pages/site/docs/how/threat-model.html:884
 msgid "However, two techniques help defend against these attacks:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:785
+#: i2p2www/pages/site/docs/how/threat-model.html:888
 #, python-format
 msgid ""
 "All components of the network must be open source to enable inspection, "
@@ -11426,7 +11507,7 @@ msgid ""
 "to restrict modifications to those previously approved."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:793
+#: i2p2www/pages/site/docs/how/threat-model.html:896
 #, python-format
 msgid ""
 "Development over the network itself, allowing developers to stay "
@@ -11440,18 +11521,18 @@ msgid ""
 "all available within I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:804
+#: i2p2www/pages/site/docs/how/threat-model.html:907
 msgid ""
 "We also maintain relationships with various organizations that offer "
 "legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:809
+#: i2p2www/pages/site/docs/how/threat-model.html:912
 msgid "Implementation attacks (bugs)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:810
+#: i2p2www/pages/site/docs/how/threat-model.html:916
 msgid ""
 "Try as we might, most nontrivial applications include errors in the "
 "design or \n"
@@ -11468,7 +11549,7 @@ msgid ""
 "obscurity</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:821
+#: i2p2www/pages/site/docs/how/threat-model.html:927
 msgid ""
 "In addition, the code is being \n"
 "treated the same way, with little aversion towards reworking or throwing "
@@ -11484,7 +11565,7 @@ msgid ""
 "enough to identify shortcomings and bugs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:831
+#: i2p2www/pages/site/docs/how/threat-model.html:937
 msgid ""
 "Our software is likely, in particular, to contain bugs related to denial "
 "of service\n"
@@ -11494,7 +11575,7 @@ msgid ""
 "protocols."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:837
+#: i2p2www/pages/site/docs/how/threat-model.html:943
 #, python-format
 msgid ""
 "I2P is still a small network with a small development community and "
@@ -11506,11 +11587,11 @@ msgid ""
 "<a href=\"%(volunteer)s\">get involved</a> and help."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:850
+#: i2p2www/pages/site/docs/how/threat-model.html:956
 msgid "Blocklists"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:851
+#: i2p2www/pages/site/docs/how/threat-model.html:957
 msgid ""
 "To some extent, I2P could be enhanced to avoid peers operating at IP "
 "addresses\n"
@@ -11520,7 +11601,7 @@ msgid ""
 "others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:857
+#: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
 "To the extent that active peers actually do show up in the actual "
 "blocklist,\n"
@@ -11530,7 +11611,7 @@ msgid ""
 "enable it by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:865
+#: i2p2www/pages/site/docs/how/threat-model.html:971
 msgid ""
 "Blocklists are only a part (perhaps a small part) of an array of defenses"
 "\n"
@@ -11541,7 +11622,7 @@ msgid ""
 "list above there are improvements we can make in detecting badness."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:874
+#: i2p2www/pages/site/docs/how/threat-model.html:980
 msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
@@ -11551,7 +11632,7 @@ msgid ""
 "the i2p network down. Completely."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:882
+#: i2p2www/pages/site/docs/how/threat-model.html:988
 msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
@@ -12781,10 +12862,6 @@ msgstr ""
 msgid "Type"
 msgstr ""
 
-#: i2p2www/pages/site/docs/protocol/i2np.html:94
-msgid "Priority"
-msgstr ""
-
 #: i2p2www/pages/site/docs/protocol/i2np.html:95
 msgid "Comments"
 msgstr ""
diff --git a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
index f5e8e6dfe109f3bc62c5ced14cc1cd6e4cc6e666..90ff4eb8c46d43c2f1d983054c419c60ef96b905 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
@@ -10,7 +10,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-22 17:33+0000\n"
 "Last-Translator: Towatowa441\n"
 "Language-Team: French "
@@ -1223,29 +1223,29 @@ msgid "Current bounties"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Name"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Status"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Judge"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Dev"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Bounty"
 msgstr ""
 
@@ -1257,9 +1257,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:40
 #: i2p2www/pages/site/get-involved/bounties/index.html:47
 #: i2p2www/pages/site/get-involved/bounties/index.html:54
-#: i2p2www/pages/site/get-involved/bounties/index.html:61
+#: i2p2www/pages/site/get-involved/bounties/index.html:75
 #: i2p2www/pages/site/get-involved/bounties/index.html:82
-#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Proposal in development"
 msgstr ""
 
@@ -1267,9 +1266,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:42
 #: i2p2www/pages/site/get-involved/bounties/index.html:49
 #: i2p2www/pages/site/get-involved/bounties/index.html:56
-#: i2p2www/pages/site/get-involved/bounties/index.html:63
-#: i2p2www/pages/site/get-involved/bounties/index.html:84
-#: i2p2www/pages/site/get-involved/bounties/index.html:104
+#: i2p2www/pages/site/get-involved/bounties/index.html:77
+#: i2p2www/pages/site/get-involved/bounties/index.html:97
 msgid "vacant"
 msgstr ""
 
@@ -1282,49 +1280,49 @@ msgid "Backporting Phex code onto I2PHex"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:53
-msgid "Make I2P IPv6 native"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "I2P package in Debian and Ubuntu mirrors"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:67
+#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "Bitcoin client for I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:68
+#: i2p2www/pages/site/get-involved/bounties/index.html:61
 msgid "Done, phase of verification"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:74
+#: i2p2www/pages/site/get-involved/bounties/index.html:67
 msgid "Unit tests and Multi-router Simulation"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:75
+#: i2p2www/pages/site/get-involved/bounties/index.html:68
 msgid "Partly done, partly in work, partly still open"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:96
+#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:101
+#: i2p2www/pages/site/get-involved/bounties/index.html:94
 msgid "Bundling bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:102
+#: i2p2www/pages/site/get-involved/bounties/index.html:95
 msgid "Proposed"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:109
+#: i2p2www/pages/site/get-involved/bounties/index.html:102
 msgid "Claimed bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Dev team"
 msgstr ""
 
+#: i2p2www/pages/site/get-involved/bounties/index.html:107
+msgid "Make I2P IPv6 native"
+msgstr ""
+
 #: i2p2www/pages/site/get-involved/bounties/index.html:114
 msgid "Setting up a SILC server"
 msgstr ""
@@ -1379,7 +1377,7 @@ msgid ""
 "IPv6 connections like it does on IPv4."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15
+#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17
 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
 msgid ""
 "For bounties to be declared done and paid, we need the plugin AND the "
diff --git a/i2p2www/translations/fr/LC_MESSAGES/priority.po b/i2p2www/translations/fr/LC_MESSAGES/priority.po
index f8b7d59e0cd0f39be2b4a203d6719d266e0b7a07..83896114370768a093271c8b3e986c5a1a2c1c61 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/priority.po
@@ -10,7 +10,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-30 15:06+0000\n"
 "Last-Translator: Towatowa441\n"
 "Language-Team: French "
@@ -3519,22 +3519,26 @@ msgstr ""
 "tutoriels au sujet de I2P</a>."
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr "Amis de I2P"
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr "Davantage de projets et documentation"
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr "Presse"
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr "Forums, actualités sur ce site web, autres"
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr "Très vieilles choses"
 
diff --git a/i2p2www/translations/pt/LC_MESSAGES/priority.po b/i2p2www/translations/pt/LC_MESSAGES/priority.po
index 042a1c6eaadd9182c76cf3369a5cde838bb539f8..6062586af67e369f308fa71df48967a49cd442a3 100644
--- a/i2p2www/translations/pt/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/pt/LC_MESSAGES/priority.po
@@ -10,7 +10,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-16 13:04+0000\n"
 "Last-Translator: str4d <str4d@i2pmail.org>\n"
 "Language-Team: Portuguese "
@@ -2723,22 +2723,26 @@ msgid ""
 msgstr ""
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr ""
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr ""
 
diff --git a/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po b/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po
index e7c172a84a8d7e1dc39f0144f284c331c81af328..c7a0ec2497354564c383dda9cb244db1e5975459 100644
--- a/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-18 15:02+0000\n"
 "Last-Translator: keedley <zhopa@mita.pp.ru>\n"
 "Language-Team: Russian (Russia) "
@@ -64,6 +64,7 @@ msgstr "`страница загрузки`"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101
 msgid "RELEASE DETAILS"
 msgstr "ПОДРОБНОСТИ РЕЛИЗА"
 
@@ -75,6 +76,7 @@ msgstr "ПОДРОБНОСТИ РЕЛИЗА"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103
 msgid "Major Changes"
 msgstr "Основные изменения"
 
@@ -90,6 +92,7 @@ msgstr "Основные изменения"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112
 msgid "Bug Fixes"
 msgstr "Исправлены ошибки"
 
@@ -107,6 +110,7 @@ msgstr "Исправлены ошибки"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118
 msgid "Other"
 msgstr "Другое"
 
@@ -124,6 +128,7 @@ msgstr "Другое"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129
 msgid "SHA256 Checksums:"
 msgstr "Ключевые суммы SHA256"
 
@@ -282,6 +287,7 @@ msgstr "Враппер обновлен до 3.5.15 (для новых инст
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127
 msgid "Update GeoIP data (new installs and PPA only)"
 msgstr "Обновлены данные GeoIP (для новых инсталляций и PPA)"
 
@@ -1040,6 +1046,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107
 msgid "Anonymity Improvements"
 msgstr ""
 
@@ -1194,3 +1201,210 @@ msgstr ""
 msgid "UPnP fix for some hardware"
 msgstr ""
 
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2
+#, fuzzy
+msgid "0.9.8 Release"
+msgstr "Версия 0.9.7"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
+msgid ""
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
+#, python-format
+msgid "30% of you will update via in-network torrent in this update cycle."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
+msgid "IPv6 Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
+msgid ""
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
+"the router console. If IPv6 is causing problems you may disable it there."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
+msgid ""
+"As a part of the IPv6 development effort, I2P now supports multiple \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
+"it if necessary.\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
+"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
+"bugs still to be fixed with multiple addresses of each type."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
+msgid ""
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
+"and disable it necessary. Please report any bugs on \n"
+"http://trac.i2p2.i2p."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42
+msgid "Rekeying Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
+msgid ""
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
+"torrent updates, and the recent network growth, we expect substantial \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
+"Please be patient and things should start to improve after a few days."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
+msgid ""
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
+"computation. Performance may also be poor during the first week\n"
+"due to the network churn.\n"
+"We will evaluate the network performace before deciding whether to\n"
+"change the key length on slower hardware in a future release."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
+msgid ""
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
+"network is still performing fairly well, so keep spreading the word."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69
+#, fuzzy
+msgid "More Changes Coming"
+msgstr "Основные изменения"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71
+msgid ""
+"We're in the initial stages of desiging major changes to strengthen our \n"
+"crypto. Stronger crypto will use more CPU and it may possibly \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
+"minimum requirements will be announced well in advance."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81
+msgid "New Website"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83
+msgid ""
+"After a heroic effort by str4d, the new website preview is available at \n"
+"http://i2hq.srv.i2p2.de. We hope to see it go live at \n"
+"https://geti2p.net and http://www.i2p2.i2p soon.  Please \n"
+"contribute to the new website translations on Transifex, especially the \n"
+"website_priority resource."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
+msgid "Community Participation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93
+msgid ""
+"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n"
+"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
+"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
+"Several of us will be at 30C3 in Hamburg late this year.\n"
+"It's great to see people participating at these events and representing "
+"I2P."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
+msgid "IPv6 support for both NTCP and SSU"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109
+msgid "SSU protocol obfuscation by adding random padding"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110
+msgid "Longer encryption and DH private keys for users on faster platforms"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114
+msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115
+msgid "Fix translation of HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116
+msgid "Fix occasional runtime exception in NTCP"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
+msgid "Streaming: Improved recovery from lost acks, other fixes"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
+#, fuzzy
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr ""
+"Обновлены переводы: китайский, французский, немецкий, итальянский, "
+"польский, португальский, шведский и украинский"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
+msgid "New Romanian translation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126
+#, fuzzy
+msgid "Wrapper 3.5.20 (new installs and PPA only)"
+msgstr "Обновить враппер до 3.5.17 (новые инсталляции и PPA)"
+
diff --git a/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po b/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po
index 754e9080c584ee1ea055f40fd4983dd3da900c16..a28611689c61b135050804a53d7b039c7eb985fa 100644
--- a/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po
@@ -12,7 +12,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-23 12:26+0000\n"
 "Last-Translator: denixx <denixx.baykin@gmail.com>\n"
 "Language-Team: Russian (Russia) "
@@ -3399,22 +3399,26 @@ msgstr ""
 "<a href=\"%(media)s\">с презентациями, видео и учебниками о I2P</a>."
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr "Друзья проекта I2P"
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr "Другие Проекты и документация"
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr "Пресса"
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr "Доски, новостные сайты, другое"
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr "Очень старое добро"
 
diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po b/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po
index b99d2cf5a73a505ba614ad08443eeb7d43998ea1..abe35bc00cc898834df4455969634018d770ce73 100644
--- a/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-11 23:00+0000\n"
 "Last-Translator: hottuna <i2p@robertfoss.se>\n"
 "Language-Team: Swedish (Sweden) "
@@ -63,6 +63,7 @@ msgstr "`nerladdningssidan`"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101
 msgid "RELEASE DETAILS"
 msgstr "RELEASE DETALJER"
 
@@ -74,6 +75,7 @@ msgstr "RELEASE DETALJER"
 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24
 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103
 msgid "Major Changes"
 msgstr "Stora Förändringar"
 
@@ -89,6 +91,7 @@ msgstr "Stora Förändringar"
 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112
 msgid "Bug Fixes"
 msgstr "Buggfixar"
 
@@ -106,6 +109,7 @@ msgstr "Buggfixar"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118
 msgid "Other"
 msgstr "Andra"
 
@@ -123,6 +127,7 @@ msgstr "Andra"
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129
 msgid "SHA256 Checksums:"
 msgstr "SHA256 Kontrollsummor:"
 
@@ -277,6 +282,7 @@ msgstr "Uppdatera wrapper till 3.5.15 (enbart nya installationer or PPA)"
 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53
 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127
 msgid "Update GeoIP data (new installs and PPA only)"
 msgstr "Uppdatera GeoIP data (enbart nya installationer och PPA)"
 
@@ -936,6 +942,7 @@ msgstr ""
 
 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47
 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107
 msgid "Anonymity Improvements"
 msgstr ""
 
@@ -1090,3 +1097,208 @@ msgstr ""
 msgid "UPnP fix for some hardware"
 msgstr ""
 
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2
+#, fuzzy
+msgid "0.9.8 Release"
+msgstr "0.9.4 Release"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
+msgid ""
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
+#, python-format
+msgid "30% of you will update via in-network torrent in this update cycle."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
+msgid "IPv6 Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
+msgid ""
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
+"the router console. If IPv6 is causing problems you may disable it there."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
+msgid ""
+"As a part of the IPv6 development effort, I2P now supports multiple \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
+"it if necessary.\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
+"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
+"bugs still to be fixed with multiple addresses of each type."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
+msgid ""
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
+"and disable it necessary. Please report any bugs on \n"
+"http://trac.i2p2.i2p."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42
+msgid "Rekeying Details"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
+msgid ""
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
+"torrent updates, and the recent network growth, we expect substantial \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
+"Please be patient and things should start to improve after a few days."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
+msgid ""
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
+"computation. Performance may also be poor during the first week\n"
+"due to the network churn.\n"
+"We will evaluate the network performace before deciding whether to\n"
+"change the key length on slower hardware in a future release."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
+msgid ""
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
+"network is still performing fairly well, so keep spreading the word."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69
+#, fuzzy
+msgid "More Changes Coming"
+msgstr "Stora förändringar"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71
+msgid ""
+"We're in the initial stages of desiging major changes to strengthen our \n"
+"crypto. Stronger crypto will use more CPU and it may possibly \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
+"minimum requirements will be announced well in advance."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81
+msgid "New Website"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83
+msgid ""
+"After a heroic effort by str4d, the new website preview is available at \n"
+"http://i2hq.srv.i2p2.de. We hope to see it go live at \n"
+"https://geti2p.net and http://www.i2p2.i2p soon.  Please \n"
+"contribute to the new website translations on Transifex, especially the \n"
+"website_priority resource."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
+msgid "Community Participation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93
+msgid ""
+"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n"
+"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
+"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
+"Several of us will be at 30C3 in Hamburg late this year.\n"
+"It's great to see people participating at these events and representing "
+"I2P."
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
+msgid "IPv6 support for both NTCP and SSU"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109
+msgid "SSU protocol obfuscation by adding random padding"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110
+msgid "Longer encryption and DH private keys for users on faster platforms"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114
+msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115
+msgid "Fix translation of HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116
+msgid "Fix occasional runtime exception in NTCP"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
+msgid "Streaming: Improved recovery from lost acks, other fixes"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
+#, fuzzy
+msgid ""
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr "Översättningsuppdateringar: Italienska, Portugisiska, Spanska, Svenska"
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
+msgid "New Romanian translation"
+msgstr ""
+
+#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126
+#, fuzzy
+msgid "Wrapper 3.5.20 (new installs and PPA only)"
+msgstr "Uppdatera wrapper till 3.5.15 (enbart nya installationer or PPA)"
+
diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po b/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po
index 1c5c6327d95e1e1d482c66fb7c32b4bfaed026bf..031f46970a25a5ed4bf39445b9b65b723eb6a39b 100644
--- a/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-08-30 23:32+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-04-27 23:10+0000\n"
 "Last-Translator: Martin Svensson <digitalmannen@gmail.com>\n"
 "Language-Team: Swedish (Sweden) "
@@ -9999,11 +9999,57 @@ msgstr ""
 msgid "November 2010"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:6
-msgid "What do we mean by \"anonymous\"?"
+#: i2p2www/pages/site/docs/how/threat-model.html:7
+msgid "low"
 msgstr ""
 
 #: i2p2www/pages/site/docs/how/threat-model.html:8
+msgid "medium"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:9
+msgid "high"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:34
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "Damage Potential"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:35
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "Reliability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:36
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "Exploitability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:37
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "Affected Users"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:38
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "Discoverability"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:39
+msgid "Severity"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:40
+#: i2p2www/pages/site/docs/protocol/i2np.html:94
+msgid "Priority"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:45
+msgid "What do we mean by \"anonymous\"?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:47
 msgid ""
 "Your level of anonymity can be described as \"how hard it is for someone\n"
 "to find out information you don't want them to know?\" - who you are, "
@@ -10021,7 +10067,7 @@ msgid ""
 "data, to those fearful of discovery by powerful organizations or states."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:19
+#: i2p2www/pages/site/docs/how/threat-model.html:58
 msgid ""
 "The question of whether I2P provides sufficient anonymity for your \n"
 "particular needs is a hard one, but this page will hopefully assist in \n"
@@ -10030,7 +10076,7 @@ msgid ""
 "so that you may decide whether it meets your needs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:26
+#: i2p2www/pages/site/docs/how/threat-model.html:65
 msgid ""
 "We welcome further research and analysis on I2P's resistance to the "
 "threats described below.\n"
@@ -10039,11 +10085,11 @@ msgid ""
 "work focused on I2P is needed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:32
+#: i2p2www/pages/site/docs/how/threat-model.html:71
 msgid "Network Topology Summary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:33
+#: i2p2www/pages/site/docs/how/threat-model.html:72
 #, python-format
 msgid ""
 "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n"
@@ -10052,7 +10098,7 @@ msgid ""
 "reviewing related literature:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:39
+#: i2p2www/pages/site/docs/how/threat-model.html:78
 msgid ""
 "<b>I2P is a free route mixnet</b> - the message creator explicitly "
 "defines the\n"
@@ -10063,7 +10109,7 @@ msgid ""
 "inbound tunnel)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:45
+#: i2p2www/pages/site/docs/how/threat-model.html:84
 msgid ""
 "<b>I2P has no official entry and exit points</b> - all peers fully "
 "participate in the \n"
@@ -10071,7 +10117,7 @@ msgid ""
 "application layer, a few proxies do exist)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:50
+#: i2p2www/pages/site/docs/how/threat-model.html:89
 msgid ""
 "<b>I2P is fully distributed</b> - there are no central controls or "
 "authorities.\n"
@@ -10086,7 +10132,7 @@ msgid ""
 "anonymity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:60
+#: i2p2www/pages/site/docs/how/threat-model.html:99
 #, python-format
 msgid ""
 "We have documented plans to implement <a "
@@ -10105,7 +10151,7 @@ msgid ""
 "delay features."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:71
+#: i2p2www/pages/site/docs/how/threat-model.html:110
 msgid ""
 "In theory, routers along the message path may inject an \n"
 "arbitrary number of hops before forwarding the message to the next peer, "
@@ -10113,11 +10159,11 @@ msgid ""
 "the current implementation does not."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:78
-msgid "The Threat Model (Attacks)"
+#: i2p2www/pages/site/docs/how/threat-model.html:117
+msgid "The Threat Model"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:79
+#: i2p2www/pages/site/docs/how/threat-model.html:118
 msgid ""
 "I2P design started in 2003, not long after the advent of\n"
 "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n"
@@ -10129,7 +10175,7 @@ msgid ""
 "from the significant academic interest in Tor."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:89
+#: i2p2www/pages/site/docs/how/threat-model.html:128
 msgid ""
 "Taking from the attacks and analysis put forth in the \n"
 "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity "
@@ -10142,14 +10188,14 @@ msgid ""
 "this list to include new attacks as they are identified."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:98
+#: i2p2www/pages/site/docs/how/threat-model.html:137
 msgid ""
 "Included are some attacks that may be unique to I2P.\n"
 "We do not have good answers for all these attacks, however\n"
 "we continue to do research and improve our defenses."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:104
+#: i2p2www/pages/site/docs/how/threat-model.html:143
 msgid ""
 "In addition, many of these attacks are significantly easier than\n"
 "they should be, due to the modest size of the current network.\n"
@@ -10160,7 +10206,7 @@ msgid ""
 "these attacks will become much harder."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:114
+#: i2p2www/pages/site/docs/how/threat-model.html:153
 #, python-format
 msgid ""
 "The\n"
@@ -10170,98 +10216,133 @@ msgid ""
 "to review."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:121
-msgid "Index"
+#: i2p2www/pages/site/docs/how/threat-model.html:160
+#, python-format
+msgid ""
+"Attacks are judged using the <a href=\"%(DREAD)s\">modified "
+"<strong>DREAD</strong> model</a>:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:123
-#: i2p2www/pages/site/docs/how/threat-model.html:143
+#: i2p2www/pages/site/docs/how/threat-model.html:165
+msgid "If a threat exploit occurs, how much damage will be caused?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:166
+msgid "How reliable is the attack?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:167
+msgid "What is needed to exploit this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:168
+msgid "How many users will be affected?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:169
+msgid "How easy is it to discover this threat?"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:172
+#, python-format
+msgid ""
+"Each category is given a rating of low, medium or high. The severity\n"
+"and priority scores are calculated using the equations outlined\n"
+"<a href=\"%(DREAD)s\">here</a>."
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:178
+msgid "Index of Attacks"
+msgstr ""
+
+#: i2p2www/pages/site/docs/how/threat-model.html:180
+#: i2p2www/pages/site/docs/how/threat-model.html:200
 msgid "Brute force attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:124
-#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:181
+#: i2p2www/pages/site/docs/how/threat-model.html:244
 msgid "Timing attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:125
-#: i2p2www/pages/site/docs/how/threat-model.html:220
+#: i2p2www/pages/site/docs/how/threat-model.html:182
+#: i2p2www/pages/site/docs/how/threat-model.html:281
 msgid "Intersection attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:126
-#: i2p2www/pages/site/docs/how/threat-model.html:298
+#: i2p2www/pages/site/docs/how/threat-model.html:183
+#: i2p2www/pages/site/docs/how/threat-model.html:361
 msgid "Denial of service attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:127
-#: i2p2www/pages/site/docs/how/threat-model.html:385
+#: i2p2www/pages/site/docs/how/threat-model.html:184
+#: i2p2www/pages/site/docs/how/threat-model.html:460
 msgid "Tagging attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:128
-#: i2p2www/pages/site/docs/how/threat-model.html:400
+#: i2p2www/pages/site/docs/how/threat-model.html:185
+#: i2p2www/pages/site/docs/how/threat-model.html:478
 msgid "Partitioning attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:129
-#: i2p2www/pages/site/docs/how/threat-model.html:438
+#: i2p2www/pages/site/docs/how/threat-model.html:186
+#: i2p2www/pages/site/docs/how/threat-model.html:518
 msgid "Predecessor attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:130
-#: i2p2www/pages/site/docs/how/threat-model.html:481
+#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:563
 msgid "Harvesting attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:131
-#: i2p2www/pages/site/docs/how/threat-model.html:525
+#: i2p2www/pages/site/docs/how/threat-model.html:188
+#: i2p2www/pages/site/docs/how/threat-model.html:610
 msgid "Identification Through Traffic Analysis"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:132
-#: i2p2www/pages/site/docs/how/threat-model.html:582
+#: i2p2www/pages/site/docs/how/threat-model.html:189
+#: i2p2www/pages/site/docs/how/threat-model.html:670
 msgid "Sybil attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:133
-#: i2p2www/pages/site/docs/how/threat-model.html:629
+#: i2p2www/pages/site/docs/how/threat-model.html:190
+#: i2p2www/pages/site/docs/how/threat-model.html:719
 msgid "Buddy Exhaustion attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:134
-#: i2p2www/pages/site/docs/how/threat-model.html:651
+#: i2p2www/pages/site/docs/how/threat-model.html:191
+#: i2p2www/pages/site/docs/how/threat-model.html:744
 msgid "Cryptographic attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:135
+#: i2p2www/pages/site/docs/how/threat-model.html:192
 msgid "Floodfill attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:136
-#: i2p2www/pages/site/docs/how/threat-model.html:707
+#: i2p2www/pages/site/docs/how/threat-model.html:193
+#: i2p2www/pages/site/docs/how/threat-model.html:805
 msgid "Other Network Database attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:137
+#: i2p2www/pages/site/docs/how/threat-model.html:194
 msgid "Attacks on centralized resources"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:138
-#: i2p2www/pages/site/docs/how/threat-model.html:770
+#: i2p2www/pages/site/docs/how/threat-model.html:195
+#: i2p2www/pages/site/docs/how/threat-model.html:871
 msgid "Development attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:139
+#: i2p2www/pages/site/docs/how/threat-model.html:196
 msgid "Implementation attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:140
-#: i2p2www/pages/site/docs/how/threat-model.html:849
+#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:955
 msgid "Other Defenses"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:145
+#: i2p2www/pages/site/docs/how/threat-model.html:204
 msgid ""
 "A brute force attack can be mounted by a global passive or active "
 "adversary, \n"
@@ -10282,7 +10363,7 @@ msgid ""
 "message)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:157
+#: i2p2www/pages/site/docs/how/threat-model.html:216
 msgid ""
 "However, a powerful attacker can use brute force to detect trends - if "
 "they \n"
@@ -10309,7 +10390,7 @@ msgid ""
 "not currently implemented."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:174
+#: i2p2www/pages/site/docs/how/threat-model.html:233
 #, python-format
 msgid ""
 "As a partial defense against a single router or group of routers trying "
@@ -10322,7 +10403,7 @@ msgid ""
 "<a href=\"%(peerselection)s\">peer selection page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:187
+#: i2p2www/pages/site/docs/how/threat-model.html:248
 msgid ""
 "I2P's messages are unidirectional and do not necessarily imply that a "
 "reply\n"
@@ -10338,7 +10419,7 @@ msgid ""
 "slow to have passed the message along."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:197
+#: i2p2www/pages/site/docs/how/threat-model.html:258
 msgid ""
 "This sort of attack is powerful, but its applicability to I2P is non "
 "obvious,\n"
@@ -10356,7 +10437,7 @@ msgid ""
 "DataMessage+DeliveryStatusMessage)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:207
+#: i2p2www/pages/site/docs/how/threat-model.html:268
 #, python-format
 msgid ""
 "Without protocol scrubbing or higher latency, global active adversaries "
@@ -10372,14 +10453,14 @@ msgid ""
 "but these are unimplemented in I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:216
+#: i2p2www/pages/site/docs/how/threat-model.html:277
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against "
 "Anonymous Systems</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:222
+#: i2p2www/pages/site/docs/how/threat-model.html:285
 msgid ""
 "Intersection attacks against low latency systems are extremely powerful -"
 "\n"
@@ -10395,7 +10476,7 @@ msgid ""
 "scenarios."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:232
+#: i2p2www/pages/site/docs/how/threat-model.html:295
 #, python-format
 msgid ""
 "In summary, if an attacker is at both ends of your tunnel at the same "
@@ -10406,61 +10487,61 @@ msgid ""
 "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:240
+#: i2p2www/pages/site/docs/how/threat-model.html:303
 msgid "Partial defenses implemented in I2P:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:244
+#: i2p2www/pages/site/docs/how/threat-model.html:307
 #, python-format
 msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:247
+#: i2p2www/pages/site/docs/how/threat-model.html:310
 #, python-format
 msgid ""
 "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a "
 "small group that changes slowly"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:250
+#: i2p2www/pages/site/docs/how/threat-model.html:313
 msgid "Limits on the number of tunnels routed through a single peer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:253
+#: i2p2www/pages/site/docs/how/threat-model.html:316
 msgid ""
 "Prevention of peers from the same /16 IP range from being members of a "
 "single tunnel"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:256
+#: i2p2www/pages/site/docs/how/threat-model.html:319
 msgid ""
 "For eepsites or other hosted services, we support\n"
 "simultaneous hosting on multiple routers, or\n"
 "<a href=\"#intersection\">multihoming</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:263
+#: i2p2www/pages/site/docs/how/threat-model.html:326
 msgid ""
 "Even in total, these defenses are not a complete solution.\n"
 "Also, we have made some design choices that may significantly increase "
 "our vulnerability:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:268
+#: i2p2www/pages/site/docs/how/threat-model.html:331
 msgid "We do not use low-bandwidth \"guard nodes\""
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:271
+#: i2p2www/pages/site/docs/how/threat-model.html:334
 msgid ""
 "We use tunnel pools comprised of several tunnels, and traffic can shift "
 "from tunnel to tunnel."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:274
+#: i2p2www/pages/site/docs/how/threat-model.html:337
 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:277
+#: i2p2www/pages/site/docs/how/threat-model.html:340
 msgid ""
 "Tunnel lengths are configurable.\n"
 "While 3-hop tunnels are recommended for full protection, several "
@@ -10468,7 +10549,7 @@ msgid ""
 "services use 2-hop tunnels by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:284
+#: i2p2www/pages/site/docs/how/threat-model.html:347
 #, python-format
 msgid ""
 "In the future, it could\n"
@@ -10483,26 +10564,26 @@ msgid ""
 "as an adversary can't \"ping\" them to mount the attack.</p>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:293
+#: i2p2www/pages/site/docs/how/threat-model.html:356
 #, python-format
 msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:300
+#: i2p2www/pages/site/docs/how/threat-model.html:363
 msgid ""
 "There are a whole slew of denial of service attacks available against "
 "I2P,\n"
 "each with different costs and consequences:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:305
+#: i2p2www/pages/site/docs/how/threat-model.html:369
 msgid ""
 "<b>Greedy user attack:</b> This is simply\n"
 "people trying to consume significantly more resources than they are \n"
 "willing to contribute. The defense against this is:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:311
+#: i2p2www/pages/site/docs/how/threat-model.html:375
 #, python-format
 msgid ""
 "Set defaults so that most users provide resources to the network.\n"
@@ -10511,7 +10592,7 @@ msgid ""
 "over 95&#37; of I2P users relay traffic for others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:317
+#: i2p2www/pages/site/docs/how/threat-model.html:381
 msgid ""
 "Provide easy configuration options so that users may increase their\n"
 "contribution (share percentage) to the network. Display easy-to-"
@@ -10520,13 +10601,13 @@ msgid ""
 "contributing."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:322
+#: i2p2www/pages/site/docs/how/threat-model.html:386
 msgid ""
 "Maintain a strong community with blogs, forums, IRC, and other means of "
 "communication."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:327
+#: i2p2www/pages/site/docs/how/threat-model.html:393
 #, python-format
 msgid ""
 "<b>Starvation attack:</b> A hostile user may attempt to harm the network "
@@ -10555,7 +10636,7 @@ msgid ""
 "significant efforts required in this area."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:344
+#: i2p2www/pages/site/docs/how/threat-model.html:413
 #, python-format
 msgid ""
 "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n"
@@ -10586,7 +10667,7 @@ msgid ""
 "operation</a> is implemented)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:360
+#: i2p2www/pages/site/docs/how/threat-model.html:432
 msgid ""
 "<b>CPU load attack:</b> There are currently some methods for people to \n"
 "remotely request that a peer perform some cryptographically expensive \n"
@@ -10601,7 +10682,7 @@ msgid ""
 "bugs in the implementation."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:370
+#: i2p2www/pages/site/docs/how/threat-model.html:445
 #, python-format
 msgid ""
 "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the "
@@ -10617,7 +10698,7 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:386
+#: i2p2www/pages/site/docs/how/threat-model.html:464
 #, python-format
 msgid ""
 "Tagging attacks - modifying a message so that it can later be identified"
@@ -10643,7 +10724,7 @@ msgid ""
 "as the links are encrypted and messages signed."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:402
+#: i2p2www/pages/site/docs/how/threat-model.html:482
 msgid ""
 "Partitioning attacks - finding ways to segregate (technically or "
 "analytically)\n"
@@ -10672,7 +10753,7 @@ msgid ""
 "the moment)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:418
+#: i2p2www/pages/site/docs/how/threat-model.html:498
 #, python-format
 msgid ""
 "Partitioning the network analytically by looking for differences in how "
@@ -10702,14 +10783,14 @@ msgid ""
 "which other tunnels or messages have those delays)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:434
+#: i2p2www/pages/site/docs/how/threat-model.html:514
 #, python-format
 msgid ""
 "Also discussed on the <a href=\"%(netdb)s#threat\">network database "
 "page</a> (bootstrap attack)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:440
+#: i2p2www/pages/site/docs/how/threat-model.html:522
 msgid ""
 "The predecessor attack is passively gathering statistics in an attempt to"
 " see\n"
@@ -10726,7 +10807,7 @@ msgid ""
 "target is located."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:450
+#: i2p2www/pages/site/docs/how/threat-model.html:532
 #, python-format
 msgid ""
 "I2P avoids this in four ways: first, the peers selected to participate in"
@@ -10751,7 +10832,7 @@ msgid ""
 "attackers will merely run into that gateway."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:467
+#: i2p2www/pages/site/docs/how/threat-model.html:549
 #, python-format
 msgid ""
 "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n"
@@ -10759,7 +10840,7 @@ msgid ""
 "See also <a href=\"#intersection\">the intersection attack</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:473
+#: i2p2www/pages/site/docs/how/threat-model.html:555
 #, python-format
 msgid ""
 "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n"
@@ -10767,7 +10848,7 @@ msgid ""
 "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:482
+#: i2p2www/pages/site/docs/how/threat-model.html:567
 msgid ""
 "\"Harvesting\" means compiling a list of users running I2P.\n"
 "It can be used for legal attacks and to help\n"
@@ -10775,7 +10856,7 @@ msgid ""
 "harvesting whatever references to other peers it can find."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:489
+#: i2p2www/pages/site/docs/how/threat-model.html:574
 msgid ""
 "I2P itself is not designed with effective defenses against\n"
 "this attack, since there is the distributed network database \n"
@@ -10783,17 +10864,17 @@ msgid ""
 "The following factors make the attack somewhat harder in practice:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:496
+#: i2p2www/pages/site/docs/how/threat-model.html:581
 msgid ""
 "Network growth will make it more difficult to obtain a given proportion "
 "of the network"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:499
+#: i2p2www/pages/site/docs/how/threat-model.html:584
 msgid "Floodfill routers implement query limits as DOS protection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:502
+#: i2p2www/pages/site/docs/how/threat-model.html:587
 msgid ""
 "\"Hidden mode\", which prevents a router from publishing its information "
 "to the netDb,\n"
@@ -10801,7 +10882,7 @@ msgid ""
 "could be."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:508
+#: i2p2www/pages/site/docs/how/threat-model.html:593
 #, python-format
 msgid ""
 "In future implementations,\n"
@@ -10815,7 +10896,7 @@ msgid ""
 "they can be reached (as well as their public keys, etc)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:517
+#: i2p2www/pages/site/docs/how/threat-model.html:602
 msgid ""
 "In the future, routers could use GeoIP to identify if they are in a "
 "particular\n"
@@ -10824,7 +10905,7 @@ msgid ""
 "enact other restricted route methods."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:526
+#: i2p2www/pages/site/docs/how/threat-model.html:614
 #, python-format
 msgid ""
 "By inspecting the traffic into and out of a router, a malicious ISP\n"
@@ -10838,21 +10919,21 @@ msgid ""
 "make it somewhat difficult to identify I2P traffic:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:536
+#: i2p2www/pages/site/docs/how/threat-model.html:624
 msgid "Random port selection"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:539
+#: i2p2www/pages/site/docs/how/threat-model.html:627
 msgid "Point-to-Point Encryption of all traffic"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:542
+#: i2p2www/pages/site/docs/how/threat-model.html:630
 msgid ""
 "DH key exchange with no protocol bytes or other unencrypted constant "
 "fields"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:545
+#: i2p2www/pages/site/docs/how/threat-model.html:633
 #, python-format
 msgid ""
 "Simultaneous use of both\n"
@@ -10862,54 +10943,54 @@ msgid ""
 " track."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:553
+#: i2p2www/pages/site/docs/how/threat-model.html:641
 msgid ""
 "In the near future, we plan to directly address traffic analysis issues "
 "by further obfuscation of I2P transport protocols, possibly including:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:557
+#: i2p2www/pages/site/docs/how/threat-model.html:645
 msgid ""
 "Padding at the transport layer to random lengths, especially during the "
 "connection handshake"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:560
+#: i2p2www/pages/site/docs/how/threat-model.html:648
 msgid ""
 "Study of packet size distribution signatures, and additional padding as "
 "necessary"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:563
+#: i2p2www/pages/site/docs/how/threat-model.html:651
 msgid ""
 "Development of additional transport methods that mimic SSL or other "
 "common protocols"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:566
+#: i2p2www/pages/site/docs/how/threat-model.html:654
 msgid ""
 "Review of padding strategies at higher layers to see how they affect "
 "packet sizes at the transport layer"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:569
+#: i2p2www/pages/site/docs/how/threat-model.html:657
 msgid ""
 "Review of methods implemented by various state-level firewalls to block "
 "Tor"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:572
+#: i2p2www/pages/site/docs/how/threat-model.html:660
 msgid "Working directly with DPI and obfuscation experts"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:577
+#: i2p2www/pages/site/docs/how/threat-model.html:665
 #, python-format
 msgid ""
 "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol "
 "Obfuscation</a>"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:584
+#: i2p2www/pages/site/docs/how/threat-model.html:674
 msgid ""
 "Sybil describes a category of attacks where the adversary creates "
 "arbitrarily\n"
@@ -10939,15 +11020,15 @@ msgid ""
 "scarcity)."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:602
+#: i2p2www/pages/site/docs/how/threat-model.html:692
 msgid "Requiring HashCash Certificates in various places has two major problems:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:606
+#: i2p2www/pages/site/docs/how/threat-model.html:696
 msgid "Maintaining backward compatibility"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:609
+#: i2p2www/pages/site/docs/how/threat-model.html:699
 msgid ""
 "The classic HashCash problem -\n"
 "selecting HashCash values that are meaningful proofs of work on high-end "
@@ -10955,7 +11036,7 @@ msgid ""
 "while still being feasible on low-end machines such as mobile devices."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:616
+#: i2p2www/pages/site/docs/how/threat-model.html:706
 msgid ""
 "Various limitations on the number of routers in a given IP range restrict"
 "\n"
@@ -10965,21 +11046,21 @@ msgid ""
 "However, this is not a meaningful defense against a powerful adversary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:623
+#: i2p2www/pages/site/docs/how/threat-model.html:713
 #, python-format
 msgid ""
 "See the <a href=\"%(netdb)s#threat\">network database page</a>\n"
 "for more Sybil discussion."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:630
+#: i2p2www/pages/site/docs/how/threat-model.html:723
 #, python-format
 msgid ""
 "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure "
 "Lookup</a> Section 5.2)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:634
+#: i2p2www/pages/site/docs/how/threat-model.html:727
 #, python-format
 msgid ""
 "By refusing to accept or forward tunnel build requests, except to a "
@@ -11002,7 +11083,7 @@ msgid ""
 "Further research and defenses may be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:653
+#: i2p2www/pages/site/docs/how/threat-model.html:748
 #, python-format
 msgid ""
 "We use strong cryptography with long keys, and\n"
@@ -11030,7 +11111,7 @@ msgid ""
 "shared secret values while maintaining backward compatibility."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:672
+#: i2p2www/pages/site/docs/how/threat-model.html:767
 #, python-format
 msgid ""
 "Upgrading the various data structures and protocols to support longer "
@@ -11043,7 +11124,7 @@ msgid ""
 "implement mechanisms to make it easier for future transitions."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:681
+#: i2p2www/pages/site/docs/how/threat-model.html:776
 msgid ""
 "In the future, several I2P protocols and data structures\n"
 "support securely padding messages to arbitrary sizes, so messages could "
@@ -11055,11 +11136,11 @@ msgid ""
 "end to end messages include simple random padding."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:691
+#: i2p2www/pages/site/docs/how/threat-model.html:786
 msgid "Floodfill Anonymity attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:692
+#: i2p2www/pages/site/docs/how/threat-model.html:790
 #, python-format
 msgid ""
 "In addition to the floodfill DOS attacks described\n"
@@ -11079,7 +11160,7 @@ msgid ""
 " future research."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:708
+#: i2p2www/pages/site/docs/how/threat-model.html:806
 #, python-format
 msgid ""
 "A hostile user may attempt to harm the network by\n"
@@ -11089,11 +11170,11 @@ msgid ""
 "<a href=\"%(netdb)s#threat\">network database page</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:718
+#: i2p2www/pages/site/docs/how/threat-model.html:816
 msgid "Central Resource Attacks"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:719
+#: i2p2www/pages/site/docs/how/threat-model.html:820
 msgid ""
 "There are a few centralized or limited resources (some inside I2P, some "
 "not)\n"
@@ -11108,14 +11189,14 @@ msgid ""
 "not the operation of the network itself."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:729
+#: i2p2www/pages/site/docs/how/threat-model.html:830
 #, python-format
 msgid ""
 "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin"
 " for external public access."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:732
+#: i2p2www/pages/site/docs/how/threat-model.html:833
 #, python-format
 msgid ""
 "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed "
@@ -11125,17 +11206,17 @@ msgid ""
 "reseed hosts may need improvement."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:737
+#: i2p2www/pages/site/docs/how/threat-model.html:838
 msgid ""
 "Routers now support multiple update file locations.\n"
 "A malicious update host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:741
+#: i2p2www/pages/site/docs/how/threat-model.html:842
 msgid "Routers now support multiple default trusted update signers."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:744
+#: i2p2www/pages/site/docs/how/threat-model.html:845
 msgid ""
 "Routers now better handle <a href=\"#ffdos\">multiple unreliable "
 "floodfill peers</a>.\n"
@@ -11143,21 +11224,21 @@ msgid ""
 "href=\"#floodfill\">more</a> study."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:748
+#: i2p2www/pages/site/docs/how/threat-model.html:849
 #, python-format
 msgid ""
 "The code is now stored in a <a href=\"%(monotone)s\">distributed source "
 "control system</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:751
+#: i2p2www/pages/site/docs/how/threat-model.html:852
 msgid ""
 "Routers rely on a single news host, but there is a hardcoded backup URL "
 "pointing to a different host.\n"
 "A malicious news host could feed a huge file, need to limit the size."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:755
+#: i2p2www/pages/site/docs/how/threat-model.html:856
 #, python-format
 msgid ""
 "<a href=\"%(naming)s\">Naming system services</a>, including addressbook "
@@ -11170,7 +11251,7 @@ msgid ""
 "<a href=\"%(naming)s\">the naming page</a> for details."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:762
+#: i2p2www/pages/site/docs/how/threat-model.html:863
 msgid ""
 "We remain reliant on the DNS service for i2p2.de, losing this would cause"
 " substantial\n"
@@ -11179,7 +11260,7 @@ msgid ""
 "loss of i2p.net did."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:772
+#: i2p2www/pages/site/docs/how/threat-model.html:875
 msgid ""
 "These attacks aren't directly on the network, but instead go after its "
 "development team \n"
@@ -11195,11 +11276,11 @@ msgid ""
 "have a big problem."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:781
+#: i2p2www/pages/site/docs/how/threat-model.html:884
 msgid "However, two techniques help defend against these attacks:"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:785
+#: i2p2www/pages/site/docs/how/threat-model.html:888
 #, python-format
 msgid ""
 "All components of the network must be open source to enable inspection, "
@@ -11215,7 +11296,7 @@ msgid ""
 "to restrict modifications to those previously approved."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:793
+#: i2p2www/pages/site/docs/how/threat-model.html:896
 #, python-format
 msgid ""
 "Development over the network itself, allowing developers to stay "
@@ -11229,18 +11310,18 @@ msgid ""
 "all available within I2P."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:804
+#: i2p2www/pages/site/docs/how/threat-model.html:907
 msgid ""
 "We also maintain relationships with various organizations that offer "
 "legal advice,\n"
 "should any defense be necessary."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:809
+#: i2p2www/pages/site/docs/how/threat-model.html:912
 msgid "Implementation attacks (bugs)"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:810
+#: i2p2www/pages/site/docs/how/threat-model.html:916
 msgid ""
 "Try as we might, most nontrivial applications include errors in the "
 "design or \n"
@@ -11257,7 +11338,7 @@ msgid ""
 "obscurity</a>."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:821
+#: i2p2www/pages/site/docs/how/threat-model.html:927
 msgid ""
 "In addition, the code is being \n"
 "treated the same way, with little aversion towards reworking or throwing "
@@ -11273,7 +11354,7 @@ msgid ""
 "enough to identify shortcomings and bugs."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:831
+#: i2p2www/pages/site/docs/how/threat-model.html:937
 msgid ""
 "Our software is likely, in particular, to contain bugs related to denial "
 "of service\n"
@@ -11283,7 +11364,7 @@ msgid ""
 "protocols."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:837
+#: i2p2www/pages/site/docs/how/threat-model.html:943
 #, python-format
 msgid ""
 "I2P is still a small network with a small development community and "
@@ -11295,11 +11376,11 @@ msgid ""
 "<a href=\"%(volunteer)s\">get involved</a> and help."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:850
+#: i2p2www/pages/site/docs/how/threat-model.html:956
 msgid "Blocklists"
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:851
+#: i2p2www/pages/site/docs/how/threat-model.html:957
 msgid ""
 "To some extent, I2P could be enhanced to avoid peers operating at IP "
 "addresses\n"
@@ -11309,7 +11390,7 @@ msgid ""
 "others."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:857
+#: i2p2www/pages/site/docs/how/threat-model.html:963
 msgid ""
 "To the extent that active peers actually do show up in the actual "
 "blocklist,\n"
@@ -11319,7 +11400,7 @@ msgid ""
 "enable it by default."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:865
+#: i2p2www/pages/site/docs/how/threat-model.html:971
 msgid ""
 "Blocklists are only a part (perhaps a small part) of an array of defenses"
 "\n"
@@ -11330,7 +11411,7 @@ msgid ""
 "list above there are improvements we can make in detecting badness."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:874
+#: i2p2www/pages/site/docs/how/threat-model.html:980
 msgid ""
 "If a blocklist is hosted at a central location with automatic updates\n"
 "the network is vulnerable to a\n"
@@ -11340,7 +11421,7 @@ msgid ""
 "the i2p network down. Completely."
 msgstr ""
 
-#: i2p2www/pages/site/docs/how/threat-model.html:882
+#: i2p2www/pages/site/docs/how/threat-model.html:988
 msgid ""
 "Currently, a default blocklist is distributed with our software,\n"
 "listing only the IPs of past DOS sources.\n"
@@ -12570,10 +12651,6 @@ msgstr ""
 msgid "Type"
 msgstr ""
 
-#: i2p2www/pages/site/docs/protocol/i2np.html:94
-msgid "Priority"
-msgstr ""
-
 #: i2p2www/pages/site/docs/protocol/i2np.html:95
 msgid "Comments"
 msgstr ""
diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po b/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po
index b7c9671bb82e0bcf18484f3d343789f44668c8ae..df86b46904ec5088adc3a6000e42dd136773c846 100644
--- a/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-04-27 23:10+0000\n"
 "Last-Translator: Martin Svensson <digitalmannen@gmail.com>\n"
 "Language-Team: Swedish (Sweden) "
@@ -1154,29 +1154,29 @@ msgid "Current bounties"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Name"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Status"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Judge"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Dev"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:30
-#: i2p2www/pages/site/get-involved/bounties/index.html:99
+#: i2p2www/pages/site/get-involved/bounties/index.html:92
 msgid "Bounty"
 msgstr ""
 
@@ -1188,9 +1188,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:40
 #: i2p2www/pages/site/get-involved/bounties/index.html:47
 #: i2p2www/pages/site/get-involved/bounties/index.html:54
-#: i2p2www/pages/site/get-involved/bounties/index.html:61
+#: i2p2www/pages/site/get-involved/bounties/index.html:75
 #: i2p2www/pages/site/get-involved/bounties/index.html:82
-#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Proposal in development"
 msgstr ""
 
@@ -1198,9 +1197,8 @@ msgstr ""
 #: i2p2www/pages/site/get-involved/bounties/index.html:42
 #: i2p2www/pages/site/get-involved/bounties/index.html:49
 #: i2p2www/pages/site/get-involved/bounties/index.html:56
-#: i2p2www/pages/site/get-involved/bounties/index.html:63
-#: i2p2www/pages/site/get-involved/bounties/index.html:84
-#: i2p2www/pages/site/get-involved/bounties/index.html:104
+#: i2p2www/pages/site/get-involved/bounties/index.html:77
+#: i2p2www/pages/site/get-involved/bounties/index.html:97
 msgid "vacant"
 msgstr ""
 
@@ -1213,49 +1211,49 @@ msgid "Backporting Phex code onto I2PHex"
 msgstr ""
 
 #: i2p2www/pages/site/get-involved/bounties/index.html:53
-msgid "Make I2P IPv6 native"
-msgstr ""
-
-#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "I2P package in Debian and Ubuntu mirrors"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:67
+#: i2p2www/pages/site/get-involved/bounties/index.html:60
 msgid "Bitcoin client for I2P"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:68
+#: i2p2www/pages/site/get-involved/bounties/index.html:61
 msgid "Done, phase of verification"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:74
+#: i2p2www/pages/site/get-involved/bounties/index.html:67
 msgid "Unit tests and Multi-router Simulation"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:75
+#: i2p2www/pages/site/get-involved/bounties/index.html:68
 msgid "Partly done, partly in work, partly still open"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:96
+#: i2p2www/pages/site/get-involved/bounties/index.html:89
 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:101
+#: i2p2www/pages/site/get-involved/bounties/index.html:94
 msgid "Bundling bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:102
+#: i2p2www/pages/site/get-involved/bounties/index.html:95
 msgid "Proposed"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:109
+#: i2p2www/pages/site/get-involved/bounties/index.html:102
 msgid "Claimed bounties"
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/index.html:112
+#: i2p2www/pages/site/get-involved/bounties/index.html:105
 msgid "Dev team"
 msgstr ""
 
+#: i2p2www/pages/site/get-involved/bounties/index.html:107
+msgid "Make I2P IPv6 native"
+msgstr ""
+
 #: i2p2www/pages/site/get-involved/bounties/index.html:114
 msgid "Setting up a SILC server"
 msgstr ""
@@ -1310,7 +1308,7 @@ msgid ""
 "IPv6 connections like it does on IPv4."
 msgstr ""
 
-#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15
+#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17
 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
 msgid ""
 "For bounties to be declared done and paid, we need the plugin AND the "
diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po b/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po
index d9cd1799b9c2702e0dfd5cd5ea14fd010a8ba0fb..61a5fe5e47679f1cb9c327f883b596783482ad4f 100644
--- a/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-27 13:36+0000\n"
 "Last-Translator: hottuna <i2p@robertfoss.se>\n"
 "Language-Team: Swedish (Sweden) "
@@ -3378,22 +3378,26 @@ msgstr ""
 "I2P</a>."
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr "Vänner till I2P"
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr "Fler Projekt och Dokumentation"
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr "Press"
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr "Anslagstavlor, nyhetssida, annat"
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr "Väldigt Gamla Saker"
 
diff --git a/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po b/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po
index e5ec354885ba5397aa1a73422a80307f8f279446..7f48782b0d011f5682da287175ba7e544d3195b8 100644
--- a/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po
@@ -9,7 +9,7 @@ msgid ""
 msgstr ""
 "Project-Id-Version:  I2P\n"
 "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n"
-"POT-Creation-Date: 2013-09-16 12:59+0000\n"
+"POT-Creation-Date: 2013-09-30 21:40+0000\n"
 "PO-Revision-Date: 2013-09-16 13:04+0000\n"
 "Last-Translator: str4d <str4d@i2pmail.org>\n"
 "Language-Team: Chinese (China) "
@@ -2679,22 +2679,26 @@ msgstr ""
 "<a href=\"%(media)s\">有关 I2P 的演讲、视频及教程</a>。"
 
 #: i2p2www/pages/site/links.html:12
+msgid "I2P on the web"
+msgstr ""
+
+#: i2p2www/pages/site/links.html:20
 msgid "Friends of I2P"
 msgstr "I2P 之友"
 
-#: i2p2www/pages/site/links.html:24
+#: i2p2www/pages/site/links.html:32
 msgid "More Projects and Documentation"
 msgstr "更多项目和文档"
 
-#: i2p2www/pages/site/links.html:34
+#: i2p2www/pages/site/links.html:42
 msgid "Press"
 msgstr "æ–°é—»"
 
-#: i2p2www/pages/site/links.html:38
+#: i2p2www/pages/site/links.html:46
 msgid "Boards, newssite, others"
 msgstr "论坛,新闻站,其它"
 
-#: i2p2www/pages/site/links.html:42
+#: i2p2www/pages/site/links.html:50
 msgid "Very Old Stuff"
 msgstr ""