diff --git a/i2p2www/translations/de/LC_MESSAGES/blog.po b/i2p2www/translations/de/LC_MESSAGES/blog.po index b8735360b2d3f6092b85e8c746a291a020b75a22..0f34ef331e3d210545ea8d6cdbe78db648fdb6b6 100644 --- a/i2p2www/translations/de/LC_MESSAGES/blog.po +++ b/i2p2www/translations/de/LC_MESSAGES/blog.po @@ -11,7 +11,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-08-12 10:32+0000\n" "Last-Translator: str4d <str4d@i2pmail.org>\n" "Language-Team: German " @@ -65,6 +65,7 @@ msgstr "`Download Seite`" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101 msgid "RELEASE DETAILS" msgstr "RELEASE DETAILS" @@ -76,6 +77,7 @@ msgstr "RELEASE DETAILS" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103 msgid "Major Changes" msgstr "Wesentliche Änderungen" @@ -91,6 +93,7 @@ msgstr "Wesentliche Änderungen" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112 msgid "Bug Fixes" msgstr "Bug Fixes" @@ -108,6 +111,7 @@ msgstr "Bug Fixes" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118 msgid "Other" msgstr "Andere" @@ -125,6 +129,7 @@ msgstr "Andere" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129 msgid "SHA256 Checksums:" msgstr "SHA256 Checksumme:" @@ -255,6 +260,7 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127 msgid "Update GeoIP data (new installs and PPA only)" msgstr "GeoIP Daten Update (nur bei neuen Installationen oder PPA)" @@ -899,6 +905,7 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107 msgid "Anonymity Improvements" msgstr "" @@ -1053,3 +1060,207 @@ msgstr "" msgid "UPnP fix for some hardware" msgstr "" +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2 +#, fuzzy +msgid "0.9.8 Release" +msgstr "0.9.4 Release" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9 +msgid "" +"0.9.8 includes the long-awaited support for IPv6. It's enabled by " +"default, but of course you need a public IPv6 address to use it. " +"Configuration is on the 'network' configuration tab in your console. We " +"also have anonymity improvements including padding of SSU packets and " +"longer router private keys." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11 +#, python-format +msgid "30% of you will update via in-network torrent in this update cycle." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13 +msgid "IPv6 Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15 +msgid "" +"IPv6 is enabled and preferred by default. If you have a public IPv6 " +"address \n" +"and you are connecting to another router with a published IPv6 address, " +"it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet" +" in \n" +"the router console. If IPv6 is causing problems you may disable it there." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22 +msgid "" +"As a part of the IPv6 development effort, I2P now supports multiple \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, " +"IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The" +" \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you " +"have \n" +"multiple addresses you should review the configuration on /confignet and " +"adjust \n" +"it if necessary.\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on " +"/confignet,\n" +"we recommend that you use only one IPv4 and one IPv6 address. There are\n" +"bugs still to be fixed with multiple addresses of each type." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34 +msgid "" +"While IPv6 support was designed and developed over several years, it has" +" \n" +"only been tested by a limited number of users and is still beta. If you " +"do have \n" +"a public IPv6 address, please monitor your router and the logs for " +"problems, \n" +"and disable it necessary. Please report any bugs on \n" +"http://trac.i2p2.i2p." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42 +msgid "Rekeying Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44 +msgid "" +"For those of you running I2P on faster hardware (generally, 64-bit x86) " +"the \n" +"router will generate a new identity using longer keys. This will " +"substantially \n" +"reduce your participating traffic for 48 hours or more, while your router" +" \n" +"re-integrates into the network. Due to the new keys, the large number of" +" \n" +"torrent updates, and the recent network growth, we expect substantial \n" +"disruption to the network for a week or more after the update is " +"released. \n" +"Please be patient and things should start to improve after a few days." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54 +msgid "" +"These changes may result in higher CPU usage for some of you. We're doing" +" \n" +"our best to increase efficiency, but stronger security generally requires" +" more \n" +"computation. Performance may also be poor during the first week\n" +"due to the network churn.\n" +"We will evaluate the network performace before deciding whether to\n" +"change the key length on slower hardware in a future release." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63 +msgid "" +"We are experiencing rapid network growth in the last few weeks, which is" +" \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, " +"the \n" +"network is still performing fairly well, so keep spreading the word." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69 +msgid "More Changes Coming" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71 +msgid "" +"We're in the initial stages of desiging major changes to strengthen our \n" +"crypto. Stronger crypto will use more CPU and it may possibly \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P " +"on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but " +"some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no " +"longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " +"in \n" +"minimum requirements will be announced well in advance." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81 +msgid "New Website" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83 +msgid "" +"After a heroic effort by str4d, the new website preview is available at \n" +"http://i2hq.srv.i2p2.de. We hope to see it go live at \n" +"https://geti2p.net and http://www.i2p2.i2p soon. Please \n" +"contribute to the new website translations on Transifex, especially the \n" +"website_priority resource." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91 +msgid "Community Participation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93 +msgid "" +"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n" +"Last weekend, echelon attended the CTS IV conference in Berlin and\n" +"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" +"Several of us will be at 30C3 in Hamburg late this year.\n" +"It's great to see people participating at these events and representing " +"I2P." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105 +msgid "IPv6 support for both NTCP and SSU" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109 +msgid "SSU protocol obfuscation by adding random padding" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110 +msgid "Longer encryption and DH private keys for users on faster platforms" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114 +msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115 +msgid "Fix translation of HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116 +msgid "Fix occasional runtime exception in NTCP" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120 +msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 +msgid "Streaming: Improved recovery from lost acks, other fixes" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 +msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 +#, fuzzy +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, " +"Swedish, Turkish" +msgstr "Ãœbersetzungsupdates: Italienisch, Portugiesisch, Spanisch, Schwedisch" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 +msgid "New Romanian translation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126 +#, fuzzy +msgid "Wrapper 3.5.20 (new installs and PPA only)" +msgstr "GeoIP Daten Update (nur bei neuen Installationen oder PPA)" + diff --git a/i2p2www/translations/de/LC_MESSAGES/docs.po b/i2p2www/translations/de/LC_MESSAGES/docs.po index ecf97c4db2faf74d63d6ca21e7a85616bf06d78a..112f62ac8483ab23e391526c6735e58120d308c7 100644 --- a/i2p2www/translations/de/LC_MESSAGES/docs.po +++ b/i2p2www/translations/de/LC_MESSAGES/docs.po @@ -12,7 +12,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-16 07:16+0000\n" "Last-Translator: Ashoka <martin2p@posteo.de>\n" "Language-Team: German " @@ -10193,11 +10193,57 @@ msgstr "" msgid "November 2010" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:6 -msgid "What do we mean by \"anonymous\"?" +#: i2p2www/pages/site/docs/how/threat-model.html:7 +msgid "low" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:8 +msgid "medium" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:9 +msgid "high" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:34 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "Damage Potential" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:35 +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "Reliability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:36 +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "Exploitability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:37 +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "Affected Users" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:38 +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "Discoverability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:39 +msgid "Severity" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:40 +#: i2p2www/pages/site/docs/protocol/i2np.html:94 +msgid "Priority" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:45 +msgid "What do we mean by \"anonymous\"?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:47 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" "to find out information you don't want them to know?\" - who you are, " @@ -10215,7 +10261,7 @@ msgid "" "data, to those fearful of discovery by powerful organizations or states." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:19 +#: i2p2www/pages/site/docs/how/threat-model.html:58 msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" @@ -10224,7 +10270,7 @@ msgid "" "so that you may decide whether it meets your needs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:26 +#: i2p2www/pages/site/docs/how/threat-model.html:65 msgid "" "We welcome further research and analysis on I2P's resistance to the " "threats described below.\n" @@ -10233,11 +10279,11 @@ msgid "" "work focused on I2P is needed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:32 +#: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "Network Topology Summary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:33 +#: i2p2www/pages/site/docs/how/threat-model.html:72 #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" @@ -10246,7 +10292,7 @@ msgid "" "reviewing related literature:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:39 +#: i2p2www/pages/site/docs/how/threat-model.html:78 msgid "" "<b>I2P is a free route mixnet</b> - the message creator explicitly " "defines the\n" @@ -10257,7 +10303,7 @@ msgid "" "inbound tunnel)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:45 +#: i2p2www/pages/site/docs/how/threat-model.html:84 msgid "" "<b>I2P has no official entry and exit points</b> - all peers fully " "participate in the \n" @@ -10265,7 +10311,7 @@ msgid "" "application layer, a few proxies do exist)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:50 +#: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" "<b>I2P is fully distributed</b> - there are no central controls or " "authorities.\n" @@ -10280,7 +10326,7 @@ msgid "" "anonymity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:60 +#: i2p2www/pages/site/docs/how/threat-model.html:99 #, python-format msgid "" "We have documented plans to implement <a " @@ -10299,7 +10345,7 @@ msgid "" "delay features." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:71 +#: i2p2www/pages/site/docs/how/threat-model.html:110 msgid "" "In theory, routers along the message path may inject an \n" "arbitrary number of hops before forwarding the message to the next peer, " @@ -10307,11 +10353,11 @@ msgid "" "the current implementation does not." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:78 -msgid "The Threat Model (Attacks)" +#: i2p2www/pages/site/docs/how/threat-model.html:117 +msgid "The Threat Model" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:79 +#: i2p2www/pages/site/docs/how/threat-model.html:118 msgid "" "I2P design started in 2003, not long after the advent of\n" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" @@ -10323,7 +10369,7 @@ msgid "" "from the significant academic interest in Tor." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:89 +#: i2p2www/pages/site/docs/how/threat-model.html:128 msgid "" "Taking from the attacks and analysis put forth in the \n" "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " @@ -10336,14 +10382,14 @@ msgid "" "this list to include new attacks as they are identified." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:98 +#: i2p2www/pages/site/docs/how/threat-model.html:137 msgid "" "Included are some attacks that may be unique to I2P.\n" "We do not have good answers for all these attacks, however\n" "we continue to do research and improve our defenses." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:104 +#: i2p2www/pages/site/docs/how/threat-model.html:143 msgid "" "In addition, many of these attacks are significantly easier than\n" "they should be, due to the modest size of the current network.\n" @@ -10354,7 +10400,7 @@ msgid "" "these attacks will become much harder." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:114 +#: i2p2www/pages/site/docs/how/threat-model.html:153 #, python-format msgid "" "The\n" @@ -10364,98 +10410,133 @@ msgid "" "to review." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:121 -msgid "Index" +#: i2p2www/pages/site/docs/how/threat-model.html:160 +#, python-format +msgid "" +"Attacks are judged using the <a href=\"%(DREAD)s\">modified " +"<strong>DREAD</strong> model</a>:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:123 -#: i2p2www/pages/site/docs/how/threat-model.html:143 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "If a threat exploit occurs, how much damage will be caused?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "How reliable is the attack?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "What is needed to exploit this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "How many users will be affected?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "How easy is it to discover this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:172 +#, python-format +msgid "" +"Each category is given a rating of low, medium or high. The severity\n" +"and priority scores are calculated using the equations outlined\n" +"<a href=\"%(DREAD)s\">here</a>." +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:178 +msgid "Index of Attacks" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:180 +#: i2p2www/pages/site/docs/how/threat-model.html:200 msgid "Brute force attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:124 -#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:181 +#: i2p2www/pages/site/docs/how/threat-model.html:244 msgid "Timing attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:125 -#: i2p2www/pages/site/docs/how/threat-model.html:220 +#: i2p2www/pages/site/docs/how/threat-model.html:182 +#: i2p2www/pages/site/docs/how/threat-model.html:281 msgid "Intersection attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:126 -#: i2p2www/pages/site/docs/how/threat-model.html:298 +#: i2p2www/pages/site/docs/how/threat-model.html:183 +#: i2p2www/pages/site/docs/how/threat-model.html:361 msgid "Denial of service attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:127 -#: i2p2www/pages/site/docs/how/threat-model.html:385 +#: i2p2www/pages/site/docs/how/threat-model.html:184 +#: i2p2www/pages/site/docs/how/threat-model.html:460 msgid "Tagging attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:128 -#: i2p2www/pages/site/docs/how/threat-model.html:400 +#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:478 msgid "Partitioning attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:129 -#: i2p2www/pages/site/docs/how/threat-model.html:438 +#: i2p2www/pages/site/docs/how/threat-model.html:186 +#: i2p2www/pages/site/docs/how/threat-model.html:518 msgid "Predecessor attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:130 -#: i2p2www/pages/site/docs/how/threat-model.html:481 +#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:563 msgid "Harvesting attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:131 -#: i2p2www/pages/site/docs/how/threat-model.html:525 +#: i2p2www/pages/site/docs/how/threat-model.html:188 +#: i2p2www/pages/site/docs/how/threat-model.html:610 msgid "Identification Through Traffic Analysis" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:132 -#: i2p2www/pages/site/docs/how/threat-model.html:582 +#: i2p2www/pages/site/docs/how/threat-model.html:189 +#: i2p2www/pages/site/docs/how/threat-model.html:670 msgid "Sybil attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:133 -#: i2p2www/pages/site/docs/how/threat-model.html:629 +#: i2p2www/pages/site/docs/how/threat-model.html:190 +#: i2p2www/pages/site/docs/how/threat-model.html:719 msgid "Buddy Exhaustion attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:134 -#: i2p2www/pages/site/docs/how/threat-model.html:651 +#: i2p2www/pages/site/docs/how/threat-model.html:191 +#: i2p2www/pages/site/docs/how/threat-model.html:744 msgid "Cryptographic attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:135 +#: i2p2www/pages/site/docs/how/threat-model.html:192 msgid "Floodfill attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:136 -#: i2p2www/pages/site/docs/how/threat-model.html:707 +#: i2p2www/pages/site/docs/how/threat-model.html:193 +#: i2p2www/pages/site/docs/how/threat-model.html:805 msgid "Other Network Database attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:137 +#: i2p2www/pages/site/docs/how/threat-model.html:194 msgid "Attacks on centralized resources" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:138 -#: i2p2www/pages/site/docs/how/threat-model.html:770 +#: i2p2www/pages/site/docs/how/threat-model.html:195 +#: i2p2www/pages/site/docs/how/threat-model.html:871 msgid "Development attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:139 +#: i2p2www/pages/site/docs/how/threat-model.html:196 msgid "Implementation attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:140 -#: i2p2www/pages/site/docs/how/threat-model.html:849 +#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:955 msgid "Other Defenses" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:145 +#: i2p2www/pages/site/docs/how/threat-model.html:204 msgid "" "A brute force attack can be mounted by a global passive or active " "adversary, \n" @@ -10476,7 +10557,7 @@ msgid "" "message)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:157 +#: i2p2www/pages/site/docs/how/threat-model.html:216 msgid "" "However, a powerful attacker can use brute force to detect trends - if " "they \n" @@ -10503,7 +10584,7 @@ msgid "" "not currently implemented." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:174 +#: i2p2www/pages/site/docs/how/threat-model.html:233 #, python-format msgid "" "As a partial defense against a single router or group of routers trying " @@ -10516,7 +10597,7 @@ msgid "" "<a href=\"%(peerselection)s\">peer selection page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:248 msgid "" "I2P's messages are unidirectional and do not necessarily imply that a " "reply\n" @@ -10532,7 +10613,7 @@ msgid "" "slow to have passed the message along." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:258 msgid "" "This sort of attack is powerful, but its applicability to I2P is non " "obvious,\n" @@ -10550,7 +10631,7 @@ msgid "" "DataMessage+DeliveryStatusMessage)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:207 +#: i2p2www/pages/site/docs/how/threat-model.html:268 #, python-format msgid "" "Without protocol scrubbing or higher latency, global active adversaries " @@ -10566,14 +10647,14 @@ msgid "" "but these are unimplemented in I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:216 +#: i2p2www/pages/site/docs/how/threat-model.html:277 #, python-format msgid "" "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against " "Anonymous Systems</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:222 +#: i2p2www/pages/site/docs/how/threat-model.html:285 msgid "" "Intersection attacks against low latency systems are extremely powerful -" "\n" @@ -10589,7 +10670,7 @@ msgid "" "scenarios." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:232 +#: i2p2www/pages/site/docs/how/threat-model.html:295 #, python-format msgid "" "In summary, if an attacker is at both ends of your tunnel at the same " @@ -10600,61 +10681,61 @@ msgid "" "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:240 +#: i2p2www/pages/site/docs/how/threat-model.html:303 msgid "Partial defenses implemented in I2P:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:244 +#: i2p2www/pages/site/docs/how/threat-model.html:307 #, python-format msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:247 +#: i2p2www/pages/site/docs/how/threat-model.html:310 #, python-format msgid "" "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " "small group that changes slowly" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:250 +#: i2p2www/pages/site/docs/how/threat-model.html:313 msgid "Limits on the number of tunnels routed through a single peer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:253 +#: i2p2www/pages/site/docs/how/threat-model.html:316 msgid "" "Prevention of peers from the same /16 IP range from being members of a " "single tunnel" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:256 +#: i2p2www/pages/site/docs/how/threat-model.html:319 msgid "" "For eepsites or other hosted services, we support\n" "simultaneous hosting on multiple routers, or\n" "<a href=\"#intersection\">multihoming</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:263 +#: i2p2www/pages/site/docs/how/threat-model.html:326 msgid "" "Even in total, these defenses are not a complete solution.\n" "Also, we have made some design choices that may significantly increase " "our vulnerability:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:268 +#: i2p2www/pages/site/docs/how/threat-model.html:331 msgid "We do not use low-bandwidth \"guard nodes\"" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:271 +#: i2p2www/pages/site/docs/how/threat-model.html:334 msgid "" "We use tunnel pools comprised of several tunnels, and traffic can shift " "from tunnel to tunnel." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:274 +#: i2p2www/pages/site/docs/how/threat-model.html:337 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:277 +#: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" "Tunnel lengths are configurable.\n" "While 3-hop tunnels are recommended for full protection, several " @@ -10662,7 +10743,7 @@ msgid "" "services use 2-hop tunnels by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:284 +#: i2p2www/pages/site/docs/how/threat-model.html:347 #, python-format msgid "" "In the future, it could\n" @@ -10677,26 +10758,26 @@ msgid "" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:293 +#: i2p2www/pages/site/docs/how/threat-model.html:356 #, python-format msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:300 +#: i2p2www/pages/site/docs/how/threat-model.html:363 msgid "" "There are a whole slew of denial of service attacks available against " "I2P,\n" "each with different costs and consequences:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:305 +#: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" "<b>Greedy user attack:</b> This is simply\n" "people trying to consume significantly more resources than they are \n" "willing to contribute. The defense against this is:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:311 +#: i2p2www/pages/site/docs/how/threat-model.html:375 #, python-format msgid "" "Set defaults so that most users provide resources to the network.\n" @@ -10705,7 +10786,7 @@ msgid "" "over 95% of I2P users relay traffic for others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:317 +#: i2p2www/pages/site/docs/how/threat-model.html:381 msgid "" "Provide easy configuration options so that users may increase their\n" "contribution (share percentage) to the network. Display easy-to-" @@ -10714,13 +10795,13 @@ msgid "" "contributing." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:322 +#: i2p2www/pages/site/docs/how/threat-model.html:386 msgid "" "Maintain a strong community with blogs, forums, IRC, and other means of " "communication." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:327 +#: i2p2www/pages/site/docs/how/threat-model.html:393 #, python-format msgid "" "<b>Starvation attack:</b> A hostile user may attempt to harm the network " @@ -10749,7 +10830,7 @@ msgid "" "significant efforts required in this area." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:344 +#: i2p2www/pages/site/docs/how/threat-model.html:413 #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" @@ -10780,7 +10861,7 @@ msgid "" "operation</a> is implemented)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:360 +#: i2p2www/pages/site/docs/how/threat-model.html:432 msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" @@ -10795,7 +10876,7 @@ msgid "" "bugs in the implementation." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:370 +#: i2p2www/pages/site/docs/how/threat-model.html:445 #, python-format msgid "" "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " @@ -10811,7 +10892,7 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:386 +#: i2p2www/pages/site/docs/how/threat-model.html:464 #, python-format msgid "" "Tagging attacks - modifying a message so that it can later be identified" @@ -10837,7 +10918,7 @@ msgid "" "as the links are encrypted and messages signed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:402 +#: i2p2www/pages/site/docs/how/threat-model.html:482 msgid "" "Partitioning attacks - finding ways to segregate (technically or " "analytically)\n" @@ -10866,7 +10947,7 @@ msgid "" "the moment)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:418 +#: i2p2www/pages/site/docs/how/threat-model.html:498 #, python-format msgid "" "Partitioning the network analytically by looking for differences in how " @@ -10896,14 +10977,14 @@ msgid "" "which other tunnels or messages have those delays)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:434 +#: i2p2www/pages/site/docs/how/threat-model.html:514 #, python-format msgid "" "Also discussed on the <a href=\"%(netdb)s#threat\">network database " "page</a> (bootstrap attack)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:440 +#: i2p2www/pages/site/docs/how/threat-model.html:522 msgid "" "The predecessor attack is passively gathering statistics in an attempt to" " see\n" @@ -10920,7 +11001,7 @@ msgid "" "target is located." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:450 +#: i2p2www/pages/site/docs/how/threat-model.html:532 #, python-format msgid "" "I2P avoids this in four ways: first, the peers selected to participate in" @@ -10945,7 +11026,7 @@ msgid "" "attackers will merely run into that gateway." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:467 +#: i2p2www/pages/site/docs/how/threat-model.html:549 #, python-format msgid "" "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n" @@ -10953,7 +11034,7 @@ msgid "" "See also <a href=\"#intersection\">the intersection attack</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:473 +#: i2p2www/pages/site/docs/how/threat-model.html:555 #, python-format msgid "" "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n" @@ -10961,7 +11042,7 @@ msgid "" "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:482 +#: i2p2www/pages/site/docs/how/threat-model.html:567 msgid "" "\"Harvesting\" means compiling a list of users running I2P.\n" "It can be used for legal attacks and to help\n" @@ -10969,7 +11050,7 @@ msgid "" "harvesting whatever references to other peers it can find." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:489 +#: i2p2www/pages/site/docs/how/threat-model.html:574 msgid "" "I2P itself is not designed with effective defenses against\n" "this attack, since there is the distributed network database \n" @@ -10977,17 +11058,17 @@ msgid "" "The following factors make the attack somewhat harder in practice:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:496 +#: i2p2www/pages/site/docs/how/threat-model.html:581 msgid "" "Network growth will make it more difficult to obtain a given proportion " "of the network" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:499 +#: i2p2www/pages/site/docs/how/threat-model.html:584 msgid "Floodfill routers implement query limits as DOS protection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:502 +#: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" "\"Hidden mode\", which prevents a router from publishing its information " "to the netDb,\n" @@ -10995,7 +11076,7 @@ msgid "" "could be." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:508 +#: i2p2www/pages/site/docs/how/threat-model.html:593 #, python-format msgid "" "In future implementations,\n" @@ -11009,7 +11090,7 @@ msgid "" "they can be reached (as well as their public keys, etc)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:517 +#: i2p2www/pages/site/docs/how/threat-model.html:602 msgid "" "In the future, routers could use GeoIP to identify if they are in a " "particular\n" @@ -11018,7 +11099,7 @@ msgid "" "enact other restricted route methods." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:526 +#: i2p2www/pages/site/docs/how/threat-model.html:614 #, python-format msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" @@ -11032,21 +11113,21 @@ msgid "" "make it somewhat difficult to identify I2P traffic:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:536 +#: i2p2www/pages/site/docs/how/threat-model.html:624 msgid "Random port selection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:539 +#: i2p2www/pages/site/docs/how/threat-model.html:627 msgid "Point-to-Point Encryption of all traffic" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:542 +#: i2p2www/pages/site/docs/how/threat-model.html:630 msgid "" "DH key exchange with no protocol bytes or other unencrypted constant " "fields" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:545 +#: i2p2www/pages/site/docs/how/threat-model.html:633 #, python-format msgid "" "Simultaneous use of both\n" @@ -11056,54 +11137,54 @@ msgid "" " track." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:553 +#: i2p2www/pages/site/docs/how/threat-model.html:641 msgid "" "In the near future, we plan to directly address traffic analysis issues " "by further obfuscation of I2P transport protocols, possibly including:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:557 +#: i2p2www/pages/site/docs/how/threat-model.html:645 msgid "" "Padding at the transport layer to random lengths, especially during the " "connection handshake" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:560 +#: i2p2www/pages/site/docs/how/threat-model.html:648 msgid "" "Study of packet size distribution signatures, and additional padding as " "necessary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:563 +#: i2p2www/pages/site/docs/how/threat-model.html:651 msgid "" "Development of additional transport methods that mimic SSL or other " "common protocols" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:566 +#: i2p2www/pages/site/docs/how/threat-model.html:654 msgid "" "Review of padding strategies at higher layers to see how they affect " "packet sizes at the transport layer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:569 +#: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" "Review of methods implemented by various state-level firewalls to block " "Tor" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:572 +#: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "Working directly with DPI and obfuscation experts" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:577 +#: i2p2www/pages/site/docs/how/threat-model.html:665 #, python-format msgid "" "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol " "Obfuscation</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:584 +#: i2p2www/pages/site/docs/how/threat-model.html:674 msgid "" "Sybil describes a category of attacks where the adversary creates " "arbitrarily\n" @@ -11133,15 +11214,15 @@ msgid "" "scarcity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:602 +#: i2p2www/pages/site/docs/how/threat-model.html:692 msgid "Requiring HashCash Certificates in various places has two major problems:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:606 +#: i2p2www/pages/site/docs/how/threat-model.html:696 msgid "Maintaining backward compatibility" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:609 +#: i2p2www/pages/site/docs/how/threat-model.html:699 msgid "" "The classic HashCash problem -\n" "selecting HashCash values that are meaningful proofs of work on high-end " @@ -11149,7 +11230,7 @@ msgid "" "while still being feasible on low-end machines such as mobile devices." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:616 +#: i2p2www/pages/site/docs/how/threat-model.html:706 msgid "" "Various limitations on the number of routers in a given IP range restrict" "\n" @@ -11159,21 +11240,21 @@ msgid "" "However, this is not a meaningful defense against a powerful adversary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:623 +#: i2p2www/pages/site/docs/how/threat-model.html:713 #, python-format msgid "" "See the <a href=\"%(netdb)s#threat\">network database page</a>\n" "for more Sybil discussion." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:630 +#: i2p2www/pages/site/docs/how/threat-model.html:723 #, python-format msgid "" "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure " "Lookup</a> Section 5.2)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:634 +#: i2p2www/pages/site/docs/how/threat-model.html:727 #, python-format msgid "" "By refusing to accept or forward tunnel build requests, except to a " @@ -11196,7 +11277,7 @@ msgid "" "Further research and defenses may be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:653 +#: i2p2www/pages/site/docs/how/threat-model.html:748 #, python-format msgid "" "We use strong cryptography with long keys, and\n" @@ -11224,7 +11305,7 @@ msgid "" "shared secret values while maintaining backward compatibility." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:672 +#: i2p2www/pages/site/docs/how/threat-model.html:767 #, python-format msgid "" "Upgrading the various data structures and protocols to support longer " @@ -11237,7 +11318,7 @@ msgid "" "implement mechanisms to make it easier for future transitions." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:681 +#: i2p2www/pages/site/docs/how/threat-model.html:776 msgid "" "In the future, several I2P protocols and data structures\n" "support securely padding messages to arbitrary sizes, so messages could " @@ -11249,11 +11330,11 @@ msgid "" "end to end messages include simple random padding." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:691 +#: i2p2www/pages/site/docs/how/threat-model.html:786 msgid "Floodfill Anonymity attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:692 +#: i2p2www/pages/site/docs/how/threat-model.html:790 #, python-format msgid "" "In addition to the floodfill DOS attacks described\n" @@ -11273,7 +11354,7 @@ msgid "" " future research." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:708 +#: i2p2www/pages/site/docs/how/threat-model.html:806 #, python-format msgid "" "A hostile user may attempt to harm the network by\n" @@ -11283,11 +11364,11 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:718 +#: i2p2www/pages/site/docs/how/threat-model.html:816 msgid "Central Resource Attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:719 +#: i2p2www/pages/site/docs/how/threat-model.html:820 msgid "" "There are a few centralized or limited resources (some inside I2P, some " "not)\n" @@ -11302,14 +11383,14 @@ msgid "" "not the operation of the network itself." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:729 +#: i2p2www/pages/site/docs/how/threat-model.html:830 #, python-format msgid "" "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" " for external public access." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:732 +#: i2p2www/pages/site/docs/how/threat-model.html:833 #, python-format msgid "" "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " @@ -11319,17 +11400,17 @@ msgid "" "reseed hosts may need improvement." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:737 +#: i2p2www/pages/site/docs/how/threat-model.html:838 msgid "" "Routers now support multiple update file locations.\n" "A malicious update host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:741 +#: i2p2www/pages/site/docs/how/threat-model.html:842 msgid "Routers now support multiple default trusted update signers." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:744 +#: i2p2www/pages/site/docs/how/threat-model.html:845 msgid "" "Routers now better handle <a href=\"#ffdos\">multiple unreliable " "floodfill peers</a>.\n" @@ -11337,21 +11418,21 @@ msgid "" "href=\"#floodfill\">more</a> study." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:748 +#: i2p2www/pages/site/docs/how/threat-model.html:849 #, python-format msgid "" "The code is now stored in a <a href=\"%(monotone)s\">distributed source " "control system</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:751 +#: i2p2www/pages/site/docs/how/threat-model.html:852 msgid "" "Routers rely on a single news host, but there is a hardcoded backup URL " "pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:755 +#: i2p2www/pages/site/docs/how/threat-model.html:856 #, python-format msgid "" "<a href=\"%(naming)s\">Naming system services</a>, including addressbook " @@ -11364,7 +11445,7 @@ msgid "" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:762 +#: i2p2www/pages/site/docs/how/threat-model.html:863 msgid "" "We remain reliant on the DNS service for i2p2.de, losing this would cause" " substantial\n" @@ -11373,7 +11454,7 @@ msgid "" "loss of i2p.net did." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:772 +#: i2p2www/pages/site/docs/how/threat-model.html:875 msgid "" "These attacks aren't directly on the network, but instead go after its " "development team \n" @@ -11389,11 +11470,11 @@ msgid "" "have a big problem." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:781 +#: i2p2www/pages/site/docs/how/threat-model.html:884 msgid "However, two techniques help defend against these attacks:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:785 +#: i2p2www/pages/site/docs/how/threat-model.html:888 #, python-format msgid "" "All components of the network must be open source to enable inspection, " @@ -11409,7 +11490,7 @@ msgid "" "to restrict modifications to those previously approved." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:793 +#: i2p2www/pages/site/docs/how/threat-model.html:896 #, python-format msgid "" "Development over the network itself, allowing developers to stay " @@ -11423,18 +11504,18 @@ msgid "" "all available within I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:804 +#: i2p2www/pages/site/docs/how/threat-model.html:907 msgid "" "We also maintain relationships with various organizations that offer " "legal advice,\n" "should any defense be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:809 +#: i2p2www/pages/site/docs/how/threat-model.html:912 msgid "Implementation attacks (bugs)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:810 +#: i2p2www/pages/site/docs/how/threat-model.html:916 msgid "" "Try as we might, most nontrivial applications include errors in the " "design or \n" @@ -11451,7 +11532,7 @@ msgid "" "obscurity</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:821 +#: i2p2www/pages/site/docs/how/threat-model.html:927 msgid "" "In addition, the code is being \n" "treated the same way, with little aversion towards reworking or throwing " @@ -11467,7 +11548,7 @@ msgid "" "enough to identify shortcomings and bugs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:831 +#: i2p2www/pages/site/docs/how/threat-model.html:937 msgid "" "Our software is likely, in particular, to contain bugs related to denial " "of service\n" @@ -11477,7 +11558,7 @@ msgid "" "protocols." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:837 +#: i2p2www/pages/site/docs/how/threat-model.html:943 #, python-format msgid "" "I2P is still a small network with a small development community and " @@ -11489,11 +11570,11 @@ msgid "" "<a href=\"%(volunteer)s\">get involved</a> and help." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:850 +#: i2p2www/pages/site/docs/how/threat-model.html:956 msgid "Blocklists" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:851 +#: i2p2www/pages/site/docs/how/threat-model.html:957 msgid "" "To some extent, I2P could be enhanced to avoid peers operating at IP " "addresses\n" @@ -11503,7 +11584,7 @@ msgid "" "others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:857 +#: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" "To the extent that active peers actually do show up in the actual " "blocklist,\n" @@ -11513,7 +11594,7 @@ msgid "" "enable it by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:865 +#: i2p2www/pages/site/docs/how/threat-model.html:971 msgid "" "Blocklists are only a part (perhaps a small part) of an array of defenses" "\n" @@ -11524,7 +11605,7 @@ msgid "" "list above there are improvements we can make in detecting badness." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:874 +#: i2p2www/pages/site/docs/how/threat-model.html:980 msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" @@ -11534,7 +11615,7 @@ msgid "" "the i2p network down. Completely." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:882 +#: i2p2www/pages/site/docs/how/threat-model.html:988 msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" @@ -12764,10 +12845,6 @@ msgstr "" msgid "Type" msgstr "" -#: i2p2www/pages/site/docs/protocol/i2np.html:94 -msgid "Priority" -msgstr "" - #: i2p2www/pages/site/docs/protocol/i2np.html:95 msgid "Comments" msgstr "" diff --git a/i2p2www/translations/de/LC_MESSAGES/get-involved.po b/i2p2www/translations/de/LC_MESSAGES/get-involved.po index 6ed55debb5f859f1a7896806903b3a901758f898..2ffad8194be6bcff44b8fb18c0a4ba76bffc9e7e 100644 --- a/i2p2www/translations/de/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/de/LC_MESSAGES/get-involved.po @@ -11,7 +11,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-07-04 16:33+0000\n" "Last-Translator: D.A. Loader\n" "Language-Team: German " @@ -1156,29 +1156,29 @@ msgid "Current bounties" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Name" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Status" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Judge" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Dev" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Bounty" msgstr "" @@ -1190,9 +1190,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:40 #: i2p2www/pages/site/get-involved/bounties/index.html:47 #: i2p2www/pages/site/get-involved/bounties/index.html:54 -#: i2p2www/pages/site/get-involved/bounties/index.html:61 +#: i2p2www/pages/site/get-involved/bounties/index.html:75 #: i2p2www/pages/site/get-involved/bounties/index.html:82 -#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Proposal in development" msgstr "" @@ -1200,9 +1199,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:42 #: i2p2www/pages/site/get-involved/bounties/index.html:49 #: i2p2www/pages/site/get-involved/bounties/index.html:56 -#: i2p2www/pages/site/get-involved/bounties/index.html:63 -#: i2p2www/pages/site/get-involved/bounties/index.html:84 -#: i2p2www/pages/site/get-involved/bounties/index.html:104 +#: i2p2www/pages/site/get-involved/bounties/index.html:77 +#: i2p2www/pages/site/get-involved/bounties/index.html:97 msgid "vacant" msgstr "" @@ -1215,49 +1213,49 @@ msgid "Backporting Phex code onto I2PHex" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:53 -msgid "Make I2P IPv6 native" -msgstr "" - -#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "I2P package in Debian and Ubuntu mirrors" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:67 +#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "Bitcoin client for I2P" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:68 +#: i2p2www/pages/site/get-involved/bounties/index.html:61 msgid "Done, phase of verification" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:74 +#: i2p2www/pages/site/get-involved/bounties/index.html:67 msgid "Unit tests and Multi-router Simulation" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:75 +#: i2p2www/pages/site/get-involved/bounties/index.html:68 msgid "Partly done, partly in work, partly still open" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:96 +#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:101 +#: i2p2www/pages/site/get-involved/bounties/index.html:94 msgid "Bundling bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:102 +#: i2p2www/pages/site/get-involved/bounties/index.html:95 msgid "Proposed" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:109 +#: i2p2www/pages/site/get-involved/bounties/index.html:102 msgid "Claimed bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Dev team" msgstr "" +#: i2p2www/pages/site/get-involved/bounties/index.html:107 +msgid "Make I2P IPv6 native" +msgstr "" + #: i2p2www/pages/site/get-involved/bounties/index.html:114 msgid "Setting up a SILC server" msgstr "" @@ -1312,7 +1310,7 @@ msgid "" "IPv6 connections like it does on IPv4." msgstr "" -#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15 +#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20 msgid "" "For bounties to be declared done and paid, we need the plugin AND the " diff --git a/i2p2www/translations/de/LC_MESSAGES/priority.po b/i2p2www/translations/de/LC_MESSAGES/priority.po index 19af8ea81009b0443e840142a80cc71a69588c11..be552ed68e3df15b25671213c67e5426ce21c2be 100644 --- a/i2p2www/translations/de/LC_MESSAGES/priority.po +++ b/i2p2www/translations/de/LC_MESSAGES/priority.po @@ -12,7 +12,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-17 11:37+0000\n" "Last-Translator: nextloop <ga25day@mytum.de>\n" "Language-Team: German " @@ -2575,22 +2575,26 @@ msgid "" msgstr "" #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "" diff --git a/i2p2www/translations/es/LC_MESSAGES/blog.po b/i2p2www/translations/es/LC_MESSAGES/blog.po index ad637de55f0c21e75339fb523b32ea03ecd5effa..dc574094b5ece307daaab1101405b2d88465f0d7 100644 --- a/i2p2www/translations/es/LC_MESSAGES/blog.po +++ b/i2p2www/translations/es/LC_MESSAGES/blog.po @@ -13,7 +13,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-08-12 10:32+0000\n" "Last-Translator: str4d <str4d@i2pmail.org>\n" "Language-Team: Spanish " @@ -67,6 +67,7 @@ msgstr "`Página de Descargas`" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101 msgid "RELEASE DETAILS" msgstr "DETALLES DEL LANZAMIENTO" @@ -78,6 +79,7 @@ msgstr "DETALLES DEL LANZAMIENTO" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103 msgid "Major Changes" msgstr "Cambios más importantes" @@ -93,6 +95,7 @@ msgstr "Cambios más importantes" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112 msgid "Bug Fixes" msgstr "Correcciones de errores" @@ -110,6 +113,7 @@ msgstr "Correcciones de errores" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118 msgid "Other" msgstr "Otro" @@ -127,6 +131,7 @@ msgstr "Otro" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129 msgid "SHA256 Checksums:" msgstr "Sumas de comprobación SHA256:" @@ -284,6 +289,7 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127 msgid "Update GeoIP data (new installs and PPA only)" msgstr "Actualizar datos de geolocalización IP (Sólo PPA y nuevas instalaciones)" @@ -1048,6 +1054,7 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107 msgid "Anonymity Improvements" msgstr "" @@ -1202,3 +1209,210 @@ msgstr "" msgid "UPnP fix for some hardware" msgstr "" +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2 +#, fuzzy +msgid "0.9.8 Release" +msgstr "Versión 0.9.6" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9 +msgid "" +"0.9.8 includes the long-awaited support for IPv6. It's enabled by " +"default, but of course you need a public IPv6 address to use it. " +"Configuration is on the 'network' configuration tab in your console. We " +"also have anonymity improvements including padding of SSU packets and " +"longer router private keys." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11 +#, python-format +msgid "30% of you will update via in-network torrent in this update cycle." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13 +msgid "IPv6 Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15 +msgid "" +"IPv6 is enabled and preferred by default. If you have a public IPv6 " +"address \n" +"and you are connecting to another router with a published IPv6 address, " +"it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet" +" in \n" +"the router console. If IPv6 is causing problems you may disable it there." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22 +msgid "" +"As a part of the IPv6 development effort, I2P now supports multiple \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, " +"IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The" +" \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you " +"have \n" +"multiple addresses you should review the configuration on /confignet and " +"adjust \n" +"it if necessary.\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on " +"/confignet,\n" +"we recommend that you use only one IPv4 and one IPv6 address. There are\n" +"bugs still to be fixed with multiple addresses of each type." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34 +msgid "" +"While IPv6 support was designed and developed over several years, it has" +" \n" +"only been tested by a limited number of users and is still beta. If you " +"do have \n" +"a public IPv6 address, please monitor your router and the logs for " +"problems, \n" +"and disable it necessary. Please report any bugs on \n" +"http://trac.i2p2.i2p." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42 +msgid "Rekeying Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44 +msgid "" +"For those of you running I2P on faster hardware (generally, 64-bit x86) " +"the \n" +"router will generate a new identity using longer keys. This will " +"substantially \n" +"reduce your participating traffic for 48 hours or more, while your router" +" \n" +"re-integrates into the network. Due to the new keys, the large number of" +" \n" +"torrent updates, and the recent network growth, we expect substantial \n" +"disruption to the network for a week or more after the update is " +"released. \n" +"Please be patient and things should start to improve after a few days." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54 +msgid "" +"These changes may result in higher CPU usage for some of you. We're doing" +" \n" +"our best to increase efficiency, but stronger security generally requires" +" more \n" +"computation. Performance may also be poor during the first week\n" +"due to the network churn.\n" +"We will evaluate the network performace before deciding whether to\n" +"change the key length on slower hardware in a future release." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63 +msgid "" +"We are experiencing rapid network growth in the last few weeks, which is" +" \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, " +"the \n" +"network is still performing fairly well, so keep spreading the word." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69 +#, fuzzy +msgid "More Changes Coming" +msgstr "Cambios mayores" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71 +msgid "" +"We're in the initial stages of desiging major changes to strengthen our \n" +"crypto. Stronger crypto will use more CPU and it may possibly \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P " +"on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but " +"some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no " +"longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " +"in \n" +"minimum requirements will be announced well in advance." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81 +msgid "New Website" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83 +msgid "" +"After a heroic effort by str4d, the new website preview is available at \n" +"http://i2hq.srv.i2p2.de. We hope to see it go live at \n" +"https://geti2p.net and http://www.i2p2.i2p soon. Please \n" +"contribute to the new website translations on Transifex, especially the \n" +"website_priority resource." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91 +msgid "Community Participation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93 +msgid "" +"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n" +"Last weekend, echelon attended the CTS IV conference in Berlin and\n" +"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" +"Several of us will be at 30C3 in Hamburg late this year.\n" +"It's great to see people participating at these events and representing " +"I2P." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105 +msgid "IPv6 support for both NTCP and SSU" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109 +msgid "SSU protocol obfuscation by adding random padding" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110 +msgid "Longer encryption and DH private keys for users on faster platforms" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114 +msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115 +msgid "Fix translation of HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116 +msgid "Fix occasional runtime exception in NTCP" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120 +msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 +msgid "Streaming: Improved recovery from lost acks, other fixes" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 +msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 +#, fuzzy +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, " +"Swedish, Turkish" +msgstr "" +"Traducciones actualizadas: chino, francés, alemán, italiano, polaco, " +"portugués, sueco y ucraniano" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 +msgid "New Romanian translation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126 +#, fuzzy +msgid "Wrapper 3.5.20 (new installs and PPA only)" +msgstr "Actualizado el wrapper a 3.5.17 (sólo para instalaciones nuevas y PPA)" + diff --git a/i2p2www/translations/es/LC_MESSAGES/docs.po b/i2p2www/translations/es/LC_MESSAGES/docs.po index 483f928f233445be30e9737a981324b031091657..39b29bf9a6a0fb3152bbdedf1ef019ff13518e44 100644 --- a/i2p2www/translations/es/LC_MESSAGES/docs.po +++ b/i2p2www/translations/es/LC_MESSAGES/docs.po @@ -14,7 +14,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-30 09:52+0000\n" "Last-Translator: trolly <translatortr@i2pmail.org>\n" "Language-Team: Spanish " @@ -13896,11 +13896,58 @@ msgstr "Modelos de riesgo en I2P" msgid "November 2010" msgstr "Noviembre 2010" -#: i2p2www/pages/site/docs/how/threat-model.html:6 +#: i2p2www/pages/site/docs/how/threat-model.html:7 +msgid "low" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:8 +msgid "medium" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:9 +msgid "high" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:34 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "Damage Potential" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:35 +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "Reliability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:36 +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "Exploitability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:37 +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "Affected Users" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:38 +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "Discoverability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:39 +#, fuzzy +msgid "Severity" +msgstr "Seguridad" + +#: i2p2www/pages/site/docs/how/threat-model.html:40 +#: i2p2www/pages/site/docs/protocol/i2np.html:94 +msgid "Priority" +msgstr "Prioridad" + +#: i2p2www/pages/site/docs/how/threat-model.html:45 msgid "What do we mean by \"anonymous\"?" msgstr "¿Qué quiere decir con \"anónimo\"?" -#: i2p2www/pages/site/docs/how/threat-model.html:8 +#: i2p2www/pages/site/docs/how/threat-model.html:47 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" "to find out information you don't want them to know?\" - who you are, " @@ -13928,7 +13975,7 @@ msgstr "" "webs, o para aquellos que intercambian información, hasta aquellos con " "miedo de ser descubiertos por organizaciones poderosas o estados." -#: i2p2www/pages/site/docs/how/threat-model.html:19 +#: i2p2www/pages/site/docs/how/threat-model.html:58 msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" @@ -13941,7 +13988,7 @@ msgstr "" "pregunta explorando como I2P opera ante varios atauqes y asà puede " "decidir si se amolda a sus necesidades." -#: i2p2www/pages/site/docs/how/threat-model.html:26 +#: i2p2www/pages/site/docs/how/threat-model.html:65 msgid "" "We welcome further research and analysis on I2P's resistance to the " "threats described below.\n" @@ -13954,11 +14001,11 @@ msgstr "" " los textos ya existentes (la mayorÃa sobre Tor) y trabajos originales " "sobre I2P." -#: i2p2www/pages/site/docs/how/threat-model.html:32 +#: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "Network Topology Summary" msgstr "Sumario de la topologÃa de la red" -#: i2p2www/pages/site/docs/how/threat-model.html:33 +#: i2p2www/pages/site/docs/how/threat-model.html:72 #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" @@ -13971,7 +14018,7 @@ msgstr "" "<a href=\"%(links)s\">sistemas</a>, pero a la hora de revisar la " "información hay que tener en cuenta varios puntos:" -#: i2p2www/pages/site/docs/how/threat-model.html:39 +#: i2p2www/pages/site/docs/how/threat-model.html:78 msgid "" "<b>I2P is a free route mixnet</b> - the message creator explicitly " "defines the\n" @@ -13986,7 +14033,7 @@ msgstr "" "salida), y el receptor del mensaje define explÃcitamente el camino por el" " cual serán recibidos los mensajes (el túnel de entrada)." -#: i2p2www/pages/site/docs/how/threat-model.html:45 +#: i2p2www/pages/site/docs/how/threat-model.html:84 msgid "" "<b>I2P has no official entry and exit points</b> - all peers fully " "participate in the \n" @@ -13998,7 +14045,7 @@ msgstr "" "o salida en la capa de red (aún asà existen varios proxies de salida en " "la capa de aplicación)" -#: i2p2www/pages/site/docs/how/threat-model.html:50 +#: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" "<b>I2P is fully distributed</b> - there are no central controls or " "authorities.\n" @@ -14020,7 +14067,7 @@ msgstr "" "la red, pero por supuesto no es necesario hacer nada de esto (y además " "podrÃa poner en peligro su anonimato)." -#: i2p2www/pages/site/docs/how/threat-model.html:60 +#: i2p2www/pages/site/docs/how/threat-model.html:99 #, python-format msgid "" "We have documented plans to implement <a " @@ -14049,7 +14096,7 @@ msgstr "" "la implementación de esos retardos será un gran desafÃo. No está claro " "aún si implementaremos estas caracterÃsticas de retardo." -#: i2p2www/pages/site/docs/how/threat-model.html:71 +#: i2p2www/pages/site/docs/how/threat-model.html:110 msgid "" "In theory, routers along the message path may inject an \n" "arbitrary number of hops before forwarding the message to the next peer, " @@ -14060,11 +14107,12 @@ msgstr "" "arbitrario de saltos antes de enviar el mensaje al siguiente par, pero la" " implementación actual no lo hace." -#: i2p2www/pages/site/docs/how/threat-model.html:78 -msgid "The Threat Model (Attacks)" -msgstr "El modelo de reisgos (Ataques)" +#: i2p2www/pages/site/docs/how/threat-model.html:117 +#, fuzzy +msgid "The Threat Model" +msgstr "Modelos de riesgo en I2P" -#: i2p2www/pages/site/docs/how/threat-model.html:79 +#: i2p2www/pages/site/docs/how/threat-model.html:118 msgid "" "I2P design started in 2003, not long after the advent of\n" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" @@ -14086,7 +14134,7 @@ msgstr "" "cebolla, asà que continuamos beneficiándonos del significativo interés \n" "académico en Tor." -#: i2p2www/pages/site/docs/how/threat-model.html:89 +#: i2p2www/pages/site/docs/how/threat-model.html:128 msgid "" "Taking from the attacks and analysis put forth in the \n" "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " @@ -14107,7 +14155,7 @@ msgstr "" "en i2P. Actualizaremos esta lista según sean identificados nuevos " "ataques." -#: i2p2www/pages/site/docs/how/threat-model.html:98 +#: i2p2www/pages/site/docs/how/threat-model.html:137 msgid "" "Included are some attacks that may be unique to I2P.\n" "We do not have good answers for all these attacks, however\n" @@ -14117,7 +14165,7 @@ msgstr "" " soluciones perfectas para esos ataques, pero continuamos estudiando como" " defendernos de ellos." -#: i2p2www/pages/site/docs/how/threat-model.html:104 +#: i2p2www/pages/site/docs/how/threat-model.html:143 msgid "" "In addition, many of these attacks are significantly easier than\n" "they should be, due to the modest size of the current network.\n" @@ -14134,7 +14182,7 @@ msgstr "" "vayamos difundiendo la palabra y la red crezca, esos ataques serán mucho " "mas difÃciles de llevar acabo." -#: i2p2www/pages/site/docs/how/threat-model.html:114 +#: i2p2www/pages/site/docs/how/threat-model.html:153 #, python-format msgid "" "The\n" @@ -14147,98 +14195,134 @@ msgstr "" "entre redes</a> y <a href=\"%(garlicrouting)s\">\"terminologÃa garlic</a>" " sobre el tema." -#: i2p2www/pages/site/docs/how/threat-model.html:121 -msgid "Index" -msgstr "Ãndice" +#: i2p2www/pages/site/docs/how/threat-model.html:160 +#, python-format +msgid "" +"Attacks are judged using the <a href=\"%(DREAD)s\">modified " +"<strong>DREAD</strong> model</a>:" +msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:123 -#: i2p2www/pages/site/docs/how/threat-model.html:143 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "If a threat exploit occurs, how much damage will be caused?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "How reliable is the attack?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "What is needed to exploit this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "How many users will be affected?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "How easy is it to discover this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:172 +#, python-format +msgid "" +"Each category is given a rating of low, medium or high. The severity\n" +"and priority scores are calculated using the equations outlined\n" +"<a href=\"%(DREAD)s\">here</a>." +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:178 +#, fuzzy +msgid "Index of Attacks" +msgstr "Ataques de sincronización" + +#: i2p2www/pages/site/docs/how/threat-model.html:180 +#: i2p2www/pages/site/docs/how/threat-model.html:200 msgid "Brute force attacks" msgstr "Ataques de fuerza bruta" -#: i2p2www/pages/site/docs/how/threat-model.html:124 -#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:181 +#: i2p2www/pages/site/docs/how/threat-model.html:244 msgid "Timing attacks" msgstr "Ataques de sincronización" -#: i2p2www/pages/site/docs/how/threat-model.html:125 -#: i2p2www/pages/site/docs/how/threat-model.html:220 +#: i2p2www/pages/site/docs/how/threat-model.html:182 +#: i2p2www/pages/site/docs/how/threat-model.html:281 msgid "Intersection attacks" msgstr "Ataques por intersección" -#: i2p2www/pages/site/docs/how/threat-model.html:126 -#: i2p2www/pages/site/docs/how/threat-model.html:298 +#: i2p2www/pages/site/docs/how/threat-model.html:183 +#: i2p2www/pages/site/docs/how/threat-model.html:361 msgid "Denial of service attacks" msgstr "Ataques de denegación de servicio" -#: i2p2www/pages/site/docs/how/threat-model.html:127 -#: i2p2www/pages/site/docs/how/threat-model.html:385 +#: i2p2www/pages/site/docs/how/threat-model.html:184 +#: i2p2www/pages/site/docs/how/threat-model.html:460 msgid "Tagging attacks" msgstr "Ataques de etiquetado" -#: i2p2www/pages/site/docs/how/threat-model.html:128 -#: i2p2www/pages/site/docs/how/threat-model.html:400 +#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:478 msgid "Partitioning attacks" msgstr "Ataques de particionamiento" -#: i2p2www/pages/site/docs/how/threat-model.html:129 -#: i2p2www/pages/site/docs/how/threat-model.html:438 +#: i2p2www/pages/site/docs/how/threat-model.html:186 +#: i2p2www/pages/site/docs/how/threat-model.html:518 msgid "Predecessor attacks" msgstr "Ataques del predecesor" -#: i2p2www/pages/site/docs/how/threat-model.html:130 -#: i2p2www/pages/site/docs/how/threat-model.html:481 +#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:563 msgid "Harvesting attacks" msgstr "Ataques de cosechado" -#: i2p2www/pages/site/docs/how/threat-model.html:131 -#: i2p2www/pages/site/docs/how/threat-model.html:525 +#: i2p2www/pages/site/docs/how/threat-model.html:188 +#: i2p2www/pages/site/docs/how/threat-model.html:610 msgid "Identification Through Traffic Analysis" msgstr "Identificación a través de análisis del tráfico" -#: i2p2www/pages/site/docs/how/threat-model.html:132 -#: i2p2www/pages/site/docs/how/threat-model.html:582 +#: i2p2www/pages/site/docs/how/threat-model.html:189 +#: i2p2www/pages/site/docs/how/threat-model.html:670 msgid "Sybil attacks" msgstr "Ataques Sybil" -#: i2p2www/pages/site/docs/how/threat-model.html:133 -#: i2p2www/pages/site/docs/how/threat-model.html:629 +#: i2p2www/pages/site/docs/how/threat-model.html:190 +#: i2p2www/pages/site/docs/how/threat-model.html:719 msgid "Buddy Exhaustion attacks" msgstr "Ataques por agotamiento de amigos" -#: i2p2www/pages/site/docs/how/threat-model.html:134 -#: i2p2www/pages/site/docs/how/threat-model.html:651 +#: i2p2www/pages/site/docs/how/threat-model.html:191 +#: i2p2www/pages/site/docs/how/threat-model.html:744 msgid "Cryptographic attacks" msgstr "Ataques de cifrados" -#: i2p2www/pages/site/docs/how/threat-model.html:135 +#: i2p2www/pages/site/docs/how/threat-model.html:192 msgid "Floodfill attacks" msgstr "Ataques Floodfill" -#: i2p2www/pages/site/docs/how/threat-model.html:136 -#: i2p2www/pages/site/docs/how/threat-model.html:707 +#: i2p2www/pages/site/docs/how/threat-model.html:193 +#: i2p2www/pages/site/docs/how/threat-model.html:805 msgid "Other Network Database attacks" msgstr "Otros ataques a la base de datos de la red" -#: i2p2www/pages/site/docs/how/threat-model.html:137 +#: i2p2www/pages/site/docs/how/threat-model.html:194 msgid "Attacks on centralized resources" msgstr "Ataques a recursos centralizados" -#: i2p2www/pages/site/docs/how/threat-model.html:138 -#: i2p2www/pages/site/docs/how/threat-model.html:770 +#: i2p2www/pages/site/docs/how/threat-model.html:195 +#: i2p2www/pages/site/docs/how/threat-model.html:871 msgid "Development attacks" msgstr "Ataques de desarrollo" -#: i2p2www/pages/site/docs/how/threat-model.html:139 +#: i2p2www/pages/site/docs/how/threat-model.html:196 msgid "Implementation attacks" msgstr "Ataques de implementación" -#: i2p2www/pages/site/docs/how/threat-model.html:140 -#: i2p2www/pages/site/docs/how/threat-model.html:849 +#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:955 msgid "Other Defenses" msgstr "Otras defensas" -#: i2p2www/pages/site/docs/how/threat-model.html:145 +#: i2p2www/pages/site/docs/how/threat-model.html:204 msgid "" "A brute force attack can be mounted by a global passive or active " "adversary, \n" @@ -14269,7 +14353,7 @@ msgstr "" "después enviada (haciendo que un mensaje de 1024 bytes sea indistinguible" " de un mensaje de 2048 bytes)" -#: i2p2www/pages/site/docs/how/threat-model.html:157 +#: i2p2www/pages/site/docs/how/threat-model.html:216 msgid "" "However, a powerful attacker can use brute force to detect trends - if " "they \n" @@ -14309,7 +14393,7 @@ msgstr "" "usar leasesets cifrados o no publicados para las eepsites. Otras medidas," " como retardos no triviales y rutas restringidas no se han implementado." -#: i2p2www/pages/site/docs/how/threat-model.html:174 +#: i2p2www/pages/site/docs/how/threat-model.html:233 #, python-format msgid "" "As a partial defense against a single router or group of routers trying " @@ -14328,7 +14412,7 @@ msgstr "" "selección y anulación de los ruters son discutidos en la <a " "href=\"%(peerselection)s\">página de selección de ruters</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:248 msgid "" "I2P's messages are unidirectional and do not necessarily imply that a " "reply\n" @@ -14352,7 +14436,7 @@ msgstr "" "de la red, un atacante podrÃa inhabilitar algunos enlaces como mensajes " "demasiado lentos como para ser pasados." -#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:258 msgid "" "This sort of attack is powerful, but its applicability to I2P is non " "obvious,\n" @@ -14379,7 +14463,7 @@ msgstr "" "igual que que el modo de mensaje de la garantÃa del envÃo (con el " "DataMessage+DeliveryStatusMessage)." -#: i2p2www/pages/site/docs/how/threat-model.html:207 +#: i2p2www/pages/site/docs/how/threat-model.html:268 #, python-format msgid "" "Without protocol scrubbing or higher latency, global active adversaries " @@ -14403,7 +14487,7 @@ msgstr "" "href=\"%(todo)s#batching\">técnicas</a> de enrutado avanzado de túneles, " "pero estas no están implementadas en I2P." -#: i2p2www/pages/site/docs/how/threat-model.html:216 +#: i2p2www/pages/site/docs/how/threat-model.html:277 #, python-format msgid "" "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against " @@ -14412,7 +14496,7 @@ msgstr "" "Referencias: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against " "Anonymous Systems</a>" -#: i2p2www/pages/site/docs/how/threat-model.html:222 +#: i2p2www/pages/site/docs/how/threat-model.html:285 msgid "" "Intersection attacks against low latency systems are extremely powerful -" "\n" @@ -14435,7 +14519,7 @@ msgstr "" "mensaje pasa a través. El costo de este ataque aumenta según aumenta el " "tamaño de la red, pero puede ser válido en varios escenarios." -#: i2p2www/pages/site/docs/how/threat-model.html:232 +#: i2p2www/pages/site/docs/how/threat-model.html:295 #, python-format msgid "" "In summary, if an attacker is at both ends of your tunnel at the same " @@ -14451,16 +14535,16 @@ msgstr "" "enrutado onion de baja latencia. Tor proporciona una <a " "href=\"%(url)s\">aclaración similar</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:240 +#: i2p2www/pages/site/docs/how/threat-model.html:303 msgid "Partial defenses implemented in I2P:" msgstr "Defensa parcialmente implementada en I2P:" -#: i2p2www/pages/site/docs/how/threat-model.html:244 +#: i2p2www/pages/site/docs/how/threat-model.html:307 #, python-format msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers" msgstr "<a href=\"%(tunnelimpl)s#ordering\">orden estricto</a> de pares" -#: i2p2www/pages/site/docs/how/threat-model.html:247 +#: i2p2www/pages/site/docs/how/threat-model.html:310 #, python-format msgid "" "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " @@ -14469,11 +14553,11 @@ msgstr "" "<a href=\"%(peerselection)s\">selección y perfiles de los pares</a> de un" " pequeño grupo que cambia lentamente" -#: i2p2www/pages/site/docs/how/threat-model.html:250 +#: i2p2www/pages/site/docs/how/threat-model.html:313 msgid "Limits on the number of tunnels routed through a single peer" msgstr "LÃmite en el número de túneles rutados a través de un solo par" -#: i2p2www/pages/site/docs/how/threat-model.html:253 +#: i2p2www/pages/site/docs/how/threat-model.html:316 msgid "" "Prevention of peers from the same /16 IP range from being members of a " "single tunnel" @@ -14481,7 +14565,7 @@ msgstr "" "Prevención de pares del mismo rango /16 de IPs por ser miembros del mismo" " único túnel." -#: i2p2www/pages/site/docs/how/threat-model.html:256 +#: i2p2www/pages/site/docs/how/threat-model.html:319 msgid "" "For eepsites or other hosted services, we support\n" "simultaneous hosting on multiple routers, or\n" @@ -14491,7 +14575,7 @@ msgstr "" "simultáneo en múltiples ruters, o <a " "href=\"#intersection\">multihoming</a>" -#: i2p2www/pages/site/docs/how/threat-model.html:263 +#: i2p2www/pages/site/docs/how/threat-model.html:326 msgid "" "Even in total, these defenses are not a complete solution.\n" "Also, we have made some design choices that may significantly increase " @@ -14501,11 +14585,11 @@ msgstr "" "Además, hemos hecho algunas elecciones de diseño que podrÃan incrementar " "las vulnerabilidades: " -#: i2p2www/pages/site/docs/how/threat-model.html:268 +#: i2p2www/pages/site/docs/how/threat-model.html:331 msgid "We do not use low-bandwidth \"guard nodes\"" msgstr "No utilizamos \"nodos guardianes\" de bajo ancho de banda" -#: i2p2www/pages/site/docs/how/threat-model.html:271 +#: i2p2www/pages/site/docs/how/threat-model.html:334 msgid "" "We use tunnel pools comprised of several tunnels, and traffic can shift " "from tunnel to tunnel." @@ -14513,13 +14597,13 @@ msgstr "" "Usamos grupos de túneles compuestos de varios túneles, y el tráfico puede" " pasar de túnel a túnel." -#: i2p2www/pages/site/docs/how/threat-model.html:274 +#: i2p2www/pages/site/docs/how/threat-model.html:337 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes." msgstr "" "Los túneles no son de larga duración; los túneles se recrean cada 10 " "minutos." -#: i2p2www/pages/site/docs/how/threat-model.html:277 +#: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" "Tunnel lengths are configurable.\n" "While 3-hop tunnels are recommended for full protection, several " @@ -14530,7 +14614,7 @@ msgstr "" "por túnel para protección total, algunas aplicaciones y servicios usan " "túneles de 2 saltos por defecto." -#: i2p2www/pages/site/docs/how/threat-model.html:284 +#: i2p2www/pages/site/docs/how/threat-model.html:347 #, python-format msgid "" "In the future, it could\n" @@ -14553,12 +14637,12 @@ msgstr "" "que un adversario no puede contactarles,\"ping\" them, para montar el " "ataque." -#: i2p2www/pages/site/docs/how/threat-model.html:293 +#: i2p2www/pages/site/docs/how/threat-model.html:356 #, python-format msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>" msgstr "Referencia: <a href=\"%(oce)s\">One Cell Enough</a>" -#: i2p2www/pages/site/docs/how/threat-model.html:300 +#: i2p2www/pages/site/docs/how/threat-model.html:363 msgid "" "There are a whole slew of denial of service attacks available against " "I2P,\n" @@ -14567,7 +14651,7 @@ msgstr "" "Hay un montón de ataques de denegación de servicio disponibles contra " "I2P, cada cual con sus costes y consecuencias:" -#: i2p2www/pages/site/docs/how/threat-model.html:305 +#: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" "<b>Greedy user attack:</b> This is simply\n" "people trying to consume significantly more resources than they are \n" @@ -14577,7 +14661,7 @@ msgstr "" " consumir muchas más recursos de los que están dispuestos a compartir. La" " defensa contra este ataque es:" -#: i2p2www/pages/site/docs/how/threat-model.html:311 +#: i2p2www/pages/site/docs/how/threat-model.html:375 #, python-format msgid "" "Set defaults so that most users provide resources to the network.\n" @@ -14593,7 +14677,7 @@ msgstr "" "redes</a>, \n" "más del 95% de los usuarios de I2P repiten tráfico para otros." -#: i2p2www/pages/site/docs/how/threat-model.html:317 +#: i2p2www/pages/site/docs/how/threat-model.html:381 msgid "" "Provide easy configuration options so that users may increase their\n" "contribution (share percentage) to the network. Display easy-to-" @@ -14606,7 +14690,7 @@ msgstr "" "la red. Mostrar medidas fáciles de entender como \"el ratio de lo que se " "comparte\" para que los usuarios puedan ver lo que contribbuyen." -#: i2p2www/pages/site/docs/how/threat-model.html:322 +#: i2p2www/pages/site/docs/how/threat-model.html:386 msgid "" "Maintain a strong community with blogs, forums, IRC, and other means of " "communication." @@ -14614,7 +14698,7 @@ msgstr "" "Manteniendo una comunidad fuerte con blogs, foros, IRC y otras formas de " "comunicación." -#: i2p2www/pages/site/docs/how/threat-model.html:327 +#: i2p2www/pages/site/docs/how/threat-model.html:393 #, python-format msgid "" "<b>Starvation attack:</b> A hostile user may attempt to harm the network " @@ -14657,7 +14741,7 @@ msgstr "" " problemáticos; aún asà todavÃa se requieren grandes esfuerzos en este " "área." -#: i2p2www/pages/site/docs/how/threat-model.html:344 +#: i2p2www/pages/site/docs/how/threat-model.html:413 #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" @@ -14705,7 +14789,7 @@ msgstr "" "implemente el <a href=\"%(todo)s#batching\">funcionamiento avanzad de los" " túneles</a>)." -#: i2p2www/pages/site/docs/how/threat-model.html:360 +#: i2p2www/pages/site/docs/how/threat-model.html:432 msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" @@ -14727,7 +14811,7 @@ msgstr "" "ejemplo HashCash) puede mitigarse el problema, aunque hay posibilidad " "también de que un atacante explote algún error en la implementación." -#: i2p2www/pages/site/docs/how/threat-model.html:370 +#: i2p2www/pages/site/docs/how/threat-model.html:445 #, python-format msgid "" "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " @@ -14752,7 +14836,7 @@ msgstr "" "asà hay mucho por hacer todavÃa. Para más información vea la <a " "href=\"%(netdb)s#threat\">web de la base de datos de la red</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:386 +#: i2p2www/pages/site/docs/how/threat-model.html:464 #, python-format msgid "" "Tagging attacks - modifying a message so that it can later be identified" @@ -14791,7 +14875,7 @@ msgstr "" "entrada y en los de salida. Los atacantes externos tampoco pueden hacer " "nada, ya que los enlaces están cifrados y los mensajes firmados." -#: i2p2www/pages/site/docs/how/threat-model.html:402 +#: i2p2www/pages/site/docs/how/threat-model.html:482 msgid "" "Partitioning attacks - finding ways to segregate (technically or " "analytically)\n" @@ -14834,7 +14918,7 @@ msgstr "" " a estar inaccesibles, y alertar al cliente de que está temporalmente " "desconectado (este tipo de detección no está aún implementada)." -#: i2p2www/pages/site/docs/how/threat-model.html:418 +#: i2p2www/pages/site/docs/how/threat-model.html:498 #, python-format msgid "" "Partitioning the network analytically by looking for differences in how " @@ -14880,7 +14964,7 @@ msgstr "" " parte de la red (y aún asà sólo serÃa un ataque probabilÃstico, ya que " "no sabrÃa que otros túneles o mensajes tienen esos retardos)." -#: i2p2www/pages/site/docs/how/threat-model.html:434 +#: i2p2www/pages/site/docs/how/threat-model.html:514 #, python-format msgid "" "Also discussed on the <a href=\"%(netdb)s#threat\">network database " @@ -14889,7 +14973,7 @@ msgstr "" "También se discute en la <a href=\"%(netdb)s#threat\">página de la base " "de datos de la red</a> (ataque de bootstrap)." -#: i2p2www/pages/site/docs/how/threat-model.html:440 +#: i2p2www/pages/site/docs/how/threat-model.html:522 msgid "" "The predecessor attack is passively gathering statistics in an attempt to" " see\n" @@ -14914,7 +14998,7 @@ msgstr "" " resto, y ese par podrÃa llegar a estar donde el el objetivo se " "encuentra." -#: i2p2www/pages/site/docs/how/threat-model.html:450 +#: i2p2www/pages/site/docs/how/threat-model.html:532 #, python-format msgid "" "I2P avoids this in four ways: first, the peers selected to participate in" @@ -14954,7 +15038,7 @@ msgstr "" "será capaz de contactar con el objetivo, mientras que los atacantes " "simplemente pasarán por la puerta de salida." -#: i2p2www/pages/site/docs/how/threat-model.html:467 +#: i2p2www/pages/site/docs/how/threat-model.html:549 #, python-format msgid "" "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n" @@ -14966,7 +15050,7 @@ msgstr "" "predecesor. Ver también <a href=\"#intersection\">el ataque de " "interesección</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:473 +#: i2p2www/pages/site/docs/how/threat-model.html:555 #, python-format msgid "" "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n" @@ -14977,7 +15061,7 @@ msgstr "" "actualización del documento sobre el ataque del predecesor <a " "href=\"%(pdf2004)s\">%(pdf2004)s</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:482 +#: i2p2www/pages/site/docs/how/threat-model.html:567 msgid "" "\"Harvesting\" means compiling a list of users running I2P.\n" "It can be used for legal attacks and to help\n" @@ -14990,7 +15074,7 @@ msgstr "" "par, y cosechando todas las referencias que pueda encontrar sobre otros " "pares." -#: i2p2www/pages/site/docs/how/threat-model.html:489 +#: i2p2www/pages/site/docs/how/threat-model.html:574 msgid "" "I2P itself is not designed with effective defenses against\n" "this attack, since there is the distributed network database \n" @@ -15002,7 +15086,7 @@ msgstr "" "esta información. Aunque los siguientes factores hacen este ataque sea un" " poco más difÃcil en la práctica:" -#: i2p2www/pages/site/docs/how/threat-model.html:496 +#: i2p2www/pages/site/docs/how/threat-model.html:581 msgid "" "Network growth will make it more difficult to obtain a given proportion " "of the network" @@ -15010,13 +15094,13 @@ msgstr "" "El crecimiento de la red hará más difÃcil el controlar una parte " "determinada de la red." -#: i2p2www/pages/site/docs/how/threat-model.html:499 +#: i2p2www/pages/site/docs/how/threat-model.html:584 msgid "Floodfill routers implement query limits as DOS protection" msgstr "" "Los ruters floodfill implementan lÃmites en las peticiones para prevenir " "ataques de denegación de servicio, DOS." -#: i2p2www/pages/site/docs/how/threat-model.html:502 +#: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" "\"Hidden mode\", which prevents a router from publishing its information " "to the netDb,\n" @@ -15026,7 +15110,7 @@ msgstr "" "\"Modo oculto\", evita que el ruter publique su información en la netDb, " "(pero también hace que no reenvÃe datos), no se usa mucho por ahora." -#: i2p2www/pages/site/docs/how/threat-model.html:508 +#: i2p2www/pages/site/docs/how/threat-model.html:593 #, python-format msgid "" "In future implementations,\n" @@ -15047,7 +15131,7 @@ msgstr "" " túneles por los que puede ser cntactado (al igual que sus claves " "publicas y demás)." -#: i2p2www/pages/site/docs/how/threat-model.html:517 +#: i2p2www/pages/site/docs/how/threat-model.html:602 msgid "" "In the future, routers could use GeoIP to identify if they are in a " "particular\n" @@ -15060,7 +15144,7 @@ msgstr "" "peligroso. En ese caso, el ruter podrá activar el modo oculto " "automáticamente, o utilizar otros métodos de enrutado restringidos." -#: i2p2www/pages/site/docs/how/threat-model.html:526 +#: i2p2www/pages/site/docs/how/threat-model.html:614 #, python-format msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" @@ -15081,15 +15165,15 @@ msgstr "" "protocolos y la capa de transporte</a> hacen bastante difÃcil identificar" " el tráfico de I2P:" -#: i2p2www/pages/site/docs/how/threat-model.html:536 +#: i2p2www/pages/site/docs/how/threat-model.html:624 msgid "Random port selection" msgstr "Selección de puertos aleatoria" -#: i2p2www/pages/site/docs/how/threat-model.html:539 +#: i2p2www/pages/site/docs/how/threat-model.html:627 msgid "Point-to-Point Encryption of all traffic" msgstr "Cifrado de todo el tráfico de punto a punto" -#: i2p2www/pages/site/docs/how/threat-model.html:542 +#: i2p2www/pages/site/docs/how/threat-model.html:630 msgid "" "DH key exchange with no protocol bytes or other unencrypted constant " "fields" @@ -15097,7 +15181,7 @@ msgstr "" "Intercambio de clave DH sin bytes del protocolo u otros campos constantes" " no cifrados" -#: i2p2www/pages/site/docs/how/threat-model.html:545 +#: i2p2www/pages/site/docs/how/threat-model.html:633 #, python-format msgid "" "Simultaneous use of both\n" @@ -15111,7 +15195,7 @@ msgstr "" "inspeccionar y seguir con equipamiento DPI, (inspección profunda de " "paquetes)." -#: i2p2www/pages/site/docs/how/threat-model.html:553 +#: i2p2www/pages/site/docs/how/threat-model.html:641 msgid "" "In the near future, we plan to directly address traffic analysis issues " "by further obfuscation of I2P transport protocols, possibly including:" @@ -15120,7 +15204,7 @@ msgstr "" "trafico ofuscando los protocolos de transporte de I2P, probablemente " "incluyendo:" -#: i2p2www/pages/site/docs/how/threat-model.html:557 +#: i2p2www/pages/site/docs/how/threat-model.html:645 msgid "" "Padding at the transport layer to random lengths, especially during the " "connection handshake" @@ -15128,7 +15212,7 @@ msgstr "" "Rellenando la capa de transporte para que tenga determinados tamaños, " "especialmente durante el handshake de conexión" -#: i2p2www/pages/site/docs/how/threat-model.html:560 +#: i2p2www/pages/site/docs/how/threat-model.html:648 msgid "" "Study of packet size distribution signatures, and additional padding as " "necessary" @@ -15136,7 +15220,7 @@ msgstr "" "Estudiando las firmas de la distribución de los tamaños de los paquetes, " "y rellenando si es necesario." -#: i2p2www/pages/site/docs/how/threat-model.html:563 +#: i2p2www/pages/site/docs/how/threat-model.html:651 msgid "" "Development of additional transport methods that mimic SSL or other " "common protocols" @@ -15144,7 +15228,7 @@ msgstr "" "Creación de otros métodos de transporte camuflados como SSL u otros " "protocolos comunes." -#: i2p2www/pages/site/docs/how/threat-model.html:566 +#: i2p2www/pages/site/docs/how/threat-model.html:654 msgid "" "Review of padding strategies at higher layers to see how they affect " "packet sizes at the transport layer" @@ -15152,7 +15236,7 @@ msgstr "" "Revisión de las estrategias de relleno en las capas superiores para ver " "como afectan al tamaño de los paquetes en la capa de transporte." -#: i2p2www/pages/site/docs/how/threat-model.html:569 +#: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" "Review of methods implemented by various state-level firewalls to block " "Tor" @@ -15160,13 +15244,13 @@ msgstr "" "Revisar varios métodos implementados por varios cortafuegos de algunos " "estados para bloquear Tor" -#: i2p2www/pages/site/docs/how/threat-model.html:572 +#: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "Working directly with DPI and obfuscation experts" msgstr "" "Trabajar directamente con expertos en DPI, inspección profunda de " "paquetes, y expertos en ofuscación." -#: i2p2www/pages/site/docs/how/threat-model.html:577 +#: i2p2www/pages/site/docs/how/threat-model.html:665 #, python-format msgid "" "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol " @@ -15175,7 +15259,7 @@ msgstr "" "Referencia: <a href=\"%(pdf)s\">Breaking and Improving Protocol " "Obfuscation</a>" -#: i2p2www/pages/site/docs/how/threat-model.html:584 +#: i2p2www/pages/site/docs/how/threat-model.html:674 msgid "" "Sybil describes a category of attacks where the adversary creates " "arbitrarily\n" @@ -15228,15 +15312,15 @@ msgstr "" "certificado HashCash de un valor adecuado cuando sea necesario (o algún " "otro certificado que pruebe la escasez)." -#: i2p2www/pages/site/docs/how/threat-model.html:602 +#: i2p2www/pages/site/docs/how/threat-model.html:692 msgid "Requiring HashCash Certificates in various places has two major problems:" msgstr "Requerir certificados HashCash en varios sitios tiene algunos problemas:" -#: i2p2www/pages/site/docs/how/threat-model.html:606 +#: i2p2www/pages/site/docs/how/threat-model.html:696 msgid "Maintaining backward compatibility" msgstr "Mantener compatibilidad con versiones anteriores" -#: i2p2www/pages/site/docs/how/threat-model.html:609 +#: i2p2www/pages/site/docs/how/threat-model.html:699 msgid "" "The classic HashCash problem -\n" "selecting HashCash values that are meaningful proofs of work on high-end " @@ -15248,7 +15332,7 @@ msgstr "" " que también sean factibles en máquinas no tan potentes como los " "dispositivos móviles." -#: i2p2www/pages/site/docs/how/threat-model.html:616 +#: i2p2www/pages/site/docs/how/threat-model.html:706 msgid "" "Various limitations on the number of routers in a given IP range restrict" "\n" @@ -15262,7 +15346,7 @@ msgstr "" "no pueden poner más computadoras en ese bloque de IPs. Aún asà esto no es" " defensa contra un adversario con muchos recursos." -#: i2p2www/pages/site/docs/how/threat-model.html:623 +#: i2p2www/pages/site/docs/how/threat-model.html:713 #, python-format msgid "" "See the <a href=\"%(netdb)s#threat\">network database page</a>\n" @@ -15271,7 +15355,7 @@ msgstr "" "Vea la <a href=\"%(netdb)s#threat\">web de la base de datos de la red</a>" " para obtener más información sobre Sybil." -#: i2p2www/pages/site/docs/how/threat-model.html:630 +#: i2p2www/pages/site/docs/how/threat-model.html:723 #, python-format msgid "" "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure " @@ -15280,7 +15364,7 @@ msgstr "" "(Referencia: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure " "Lookup</a> Sección 5.2)" -#: i2p2www/pages/site/docs/how/threat-model.html:634 +#: i2p2www/pages/site/docs/how/threat-model.html:727 #, python-format msgid "" "By refusing to accept or forward tunnel build requests, except to a " @@ -15321,7 +15405,7 @@ msgstr "" "PodrÃa \n" "ser necesaria ulterior investigación y defensa." -#: i2p2www/pages/site/docs/how/threat-model.html:653 +#: i2p2www/pages/site/docs/how/threat-model.html:748 #, python-format msgid "" "We use strong cryptography with long keys, and\n" @@ -15367,7 +15451,7 @@ msgstr "" "cambio del tamaño de las claves o los secretos compartidos, manteniendo " "la compatibilidad con versiones anteriores." -#: i2p2www/pages/site/docs/how/threat-model.html:672 +#: i2p2www/pages/site/docs/how/threat-model.html:767 #, python-format msgid "" "Upgrading the various data structures and protocols to support longer " @@ -15387,7 +15471,7 @@ msgstr "" "planteamiento podamos minimizar los trastornos e implementar mecanismos " "que hagan más fáciles futuros cambios." -#: i2p2www/pages/site/docs/how/threat-model.html:681 +#: i2p2www/pages/site/docs/how/threat-model.html:776 msgid "" "In the future, several I2P protocols and data structures\n" "support securely padding messages to arbitrary sizes, so messages could " @@ -15405,11 +15489,11 @@ msgstr "" "más subpartes de lo que realmente tienen. Hasta el momento los túneles " "garlic y los mensajes de fin a fin utilizan un simple relleno aleatorio." -#: i2p2www/pages/site/docs/how/threat-model.html:691 +#: i2p2www/pages/site/docs/how/threat-model.html:786 msgid "Floodfill Anonymity attacks" msgstr "Ataques de anonimato FloodFill" -#: i2p2www/pages/site/docs/how/threat-model.html:692 +#: i2p2www/pages/site/docs/how/threat-model.html:790 #, python-format msgid "" "In addition to the floodfill DOS attacks described\n" @@ -15442,7 +15526,7 @@ msgstr "" "profundamente. Los ataques especÃficos potenciales y sus defensas deberán" " ser discutidos en estudios futuros." -#: i2p2www/pages/site/docs/how/threat-model.html:708 +#: i2p2www/pages/site/docs/how/threat-model.html:806 #, python-format msgid "" "A hostile user may attempt to harm the network by\n" @@ -15456,11 +15540,11 @@ msgstr "" "respondan. Varios escenarios como este han sido discutidos en la <a " "href=\"%(netdb)s#threat\">web de la base de datos de la red</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:718 +#: i2p2www/pages/site/docs/how/threat-model.html:816 msgid "Central Resource Attacks" msgstr "Ataque de Recurso Central" -#: i2p2www/pages/site/docs/how/threat-model.html:719 +#: i2p2www/pages/site/docs/how/threat-model.html:820 msgid "" "There are a few centralized or limited resources (some inside I2P, some " "not)\n" @@ -15483,7 +15567,7 @@ msgstr "" "ataques a los servicios externos afectan mayormente a cómo los nuevos " "usuarios pueden encontrarnos, no en la operación de la red en sà misma." -#: i2p2www/pages/site/docs/how/threat-model.html:729 +#: i2p2www/pages/site/docs/how/threat-model.html:830 #, python-format msgid "" "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" @@ -15492,7 +15576,7 @@ msgstr "" "La <a href=\"%(site)s\">web</a> tiene copias en varios lugares y usa " "round-robin DNS para el acceso público externo." -#: i2p2www/pages/site/docs/how/threat-model.html:732 +#: i2p2www/pages/site/docs/how/threat-model.html:833 #, python-format msgid "" "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " @@ -15506,7 +15590,7 @@ msgstr "" "resiembra, y el manejo de los ruters maliciosos o no disponibles deberÃa " "ser mejorado." -#: i2p2www/pages/site/docs/how/threat-model.html:737 +#: i2p2www/pages/site/docs/how/threat-model.html:838 msgid "" "Routers now support multiple update file locations.\n" "A malicious update host could feed a huge file, need to limit the size." @@ -15515,11 +15599,11 @@ msgstr "" "localizaciones. Un ruter malicioso de actualizaciones podrÃa enviar un " "archivo enorme, se necesita limitar el tamaño." -#: i2p2www/pages/site/docs/how/threat-model.html:741 +#: i2p2www/pages/site/docs/how/threat-model.html:842 msgid "Routers now support multiple default trusted update signers." msgstr "Los ruters ahora soportan múltiples actualizaciones de confianza firmadas." -#: i2p2www/pages/site/docs/how/threat-model.html:744 +#: i2p2www/pages/site/docs/how/threat-model.html:845 msgid "" "Routers now better handle <a href=\"#ffdos\">multiple unreliable " "floodfill peers</a>.\n" @@ -15530,7 +15614,7 @@ msgstr "" "múltiples no confiables</a>. Los FloodFills maliciosos <a " "href=\"#ffdos\">necesitan</a> <a href=\"#floodfill\">más</a> estudio." -#: i2p2www/pages/site/docs/how/threat-model.html:748 +#: i2p2www/pages/site/docs/how/threat-model.html:849 #, python-format msgid "" "The code is now stored in a <a href=\"%(monotone)s\">distributed source " @@ -15539,7 +15623,7 @@ msgstr "" "El cóodigo está ahora almacenado en un <a href=\"%(monotone)s\">sistema " "distribuido de control de código fuente</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:751 +#: i2p2www/pages/site/docs/how/threat-model.html:852 msgid "" "Routers rely on a single news host, but there is a hardcoded backup URL " "pointing to a different host.\n" @@ -15550,7 +15634,7 @@ msgstr "" "malicioso de noticias podrÃa enviar un archivo enorme, se necesita " "limitar el tamaño." -#: i2p2www/pages/site/docs/how/threat-model.html:755 +#: i2p2www/pages/site/docs/how/threat-model.html:856 #, python-format msgid "" "<a href=\"%(naming)s\">Naming system services</a>, including addressbook " @@ -15570,7 +15654,7 @@ msgstr "" "dominios requieren algún cantidad de confianza, vea <a " "href=\"%(naming)s\">la web de dominios</a> para más detalles." -#: i2p2www/pages/site/docs/how/threat-model.html:762 +#: i2p2www/pages/site/docs/how/threat-model.html:863 msgid "" "We remain reliant on the DNS service for i2p2.de, losing this would cause" " substantial\n" @@ -15583,7 +15667,7 @@ msgstr "" "reducirÃa la red (de corto a medio plazo), al igual que lo hizo la " "pérdida de i2p.net." -#: i2p2www/pages/site/docs/how/threat-model.html:772 +#: i2p2www/pages/site/docs/how/threat-model.html:875 msgid "" "These attacks aren't directly on the network, but instead go after its " "development team \n" @@ -15607,11 +15691,11 @@ msgstr "" "denuncia con secreto de sumario para que no pueda contarlo, con amenaza " "de cárcel), podrÃamos tener un gran problema." -#: i2p2www/pages/site/docs/how/threat-model.html:781 +#: i2p2www/pages/site/docs/how/threat-model.html:884 msgid "However, two techniques help defend against these attacks:" msgstr "Sin embargo, estas técnicas ayudan a defenderse contra estos ataques:" -#: i2p2www/pages/site/docs/how/threat-model.html:785 +#: i2p2www/pages/site/docs/how/threat-model.html:888 #, python-format msgid "" "All components of the network must be open source to enable inspection, " @@ -15636,7 +15720,7 @@ msgstr "" "sistema de listas de confianza para restringir las modificaciones a sólo " "aquellos que han sido aprovados." -#: i2p2www/pages/site/docs/how/threat-model.html:793 +#: i2p2www/pages/site/docs/how/threat-model.html:896 #, python-format msgid "" "Development over the network itself, allowing developers to stay " @@ -15656,7 +15740,7 @@ msgstr "" "discusión (forum.i2p), y webs de distribución de las aplicaciones, todo " "disponible dentro de I2P." -#: i2p2www/pages/site/docs/how/threat-model.html:804 +#: i2p2www/pages/site/docs/how/threat-model.html:907 msgid "" "We also maintain relationships with various organizations that offer " "legal advice,\n" @@ -15665,11 +15749,11 @@ msgstr "" "También mantenemos relaciones con organizaciones que ofrecen consejo " "legal, en caso de que fuese necesario algún tipo de defensa legal." -#: i2p2www/pages/site/docs/how/threat-model.html:809 +#: i2p2www/pages/site/docs/how/threat-model.html:912 msgid "Implementation attacks (bugs)" msgstr "Ataques de implementación (errores de programación)" -#: i2p2www/pages/site/docs/how/threat-model.html:810 +#: i2p2www/pages/site/docs/how/threat-model.html:916 msgid "" "Try as we might, most nontrivial applications include errors in the " "design or \n" @@ -15695,7 +15779,7 @@ msgstr "" " <a href=\"http://www.haystacknetwork.com/\">la seguridad por " "oscuridad</a>." -#: i2p2www/pages/site/docs/how/threat-model.html:821 +#: i2p2www/pages/site/docs/how/threat-model.html:927 msgid "" "In addition, the code is being \n" "treated the same way, with little aversion towards reworking or throwing " @@ -15718,7 +15802,7 @@ msgstr "" " ella serÃa raro que los programadores gastasen tanto tiempo en " "aprenderse el software como para identificar deficiencias y errores." -#: i2p2www/pages/site/docs/how/threat-model.html:831 +#: i2p2www/pages/site/docs/how/threat-model.html:937 msgid "" "Our software is likely, in particular, to contain bugs related to denial " "of service\n" @@ -15732,7 +15816,7 @@ msgstr "" " de memoria (OOMS), cross-site-scripting (XSS) en la consola del ruter, y" " otras vulnerabilidades no tan normales a causa de varios protocolos." -#: i2p2www/pages/site/docs/how/threat-model.html:837 +#: i2p2www/pages/site/docs/how/threat-model.html:943 #, python-format msgid "" "I2P is still a small network with a small development community and " @@ -15750,11 +15834,11 @@ msgstr "" "Continuamos reclutando gente para <a href=\"%(volunteer)s\">que se " "involucre</a> y ayude." -#: i2p2www/pages/site/docs/how/threat-model.html:850 +#: i2p2www/pages/site/docs/how/threat-model.html:956 msgid "Blocklists" msgstr "Blocklists, lista de bloqueos" -#: i2p2www/pages/site/docs/how/threat-model.html:851 +#: i2p2www/pages/site/docs/how/threat-model.html:957 msgid "" "To some extent, I2P could be enhanced to avoid peers operating at IP " "addresses\n" @@ -15768,7 +15852,7 @@ msgstr "" "varios formatos estándar, con listados de organizaciones contrarias a " "I2P, estados potencialmente peligrosos, y otros." -#: i2p2www/pages/site/docs/how/threat-model.html:857 +#: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" "To the extent that active peers actually do show up in the actual " "blocklist,\n" @@ -15783,7 +15867,7 @@ msgstr "" "general. Por lo cual queremos llegar aun acuerdo en una lista de bloqueo " "en particular y activarla por defecto." -#: i2p2www/pages/site/docs/how/threat-model.html:865 +#: i2p2www/pages/site/docs/how/threat-model.html:971 msgid "" "Blocklists are only a part (perhaps a small part) of an array of defenses" "\n" @@ -15801,7 +15885,7 @@ msgstr "" " de arriba hay mejoras que se pueden implementar para detectar la " "malicia." -#: i2p2www/pages/site/docs/how/threat-model.html:874 +#: i2p2www/pages/site/docs/how/threat-model.html:980 msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" @@ -15816,7 +15900,7 @@ msgstr "" "automáticas a una lista ofrecen al proveedor la capacidad de apagar toda " "la red i2p. Completamente." -#: i2p2www/pages/site/docs/how/threat-model.html:882 +#: i2p2www/pages/site/docs/how/threat-model.html:988 msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" @@ -17517,10 +17601,6 @@ msgstr "Mensaje" msgid "Type" msgstr "Tipo" -#: i2p2www/pages/site/docs/protocol/i2np.html:94 -msgid "Priority" -msgstr "Prioridad" - #: i2p2www/pages/site/docs/protocol/i2np.html:95 msgid "Comments" msgstr "Comentarios" diff --git a/i2p2www/translations/es/LC_MESSAGES/get-involved.po b/i2p2www/translations/es/LC_MESSAGES/get-involved.po index 72d9250ae561eaf90b57e7ed4cf5ad78094a41c7..60230d0cd310f012cb836715f9149ca415105b72 100644 --- a/i2p2www/translations/es/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/es/LC_MESSAGES/get-involved.po @@ -13,7 +13,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-17 03:30+0000\n" "Last-Translator: strel <strelnic@gmail.com>\n" "Language-Team: Spanish " @@ -1571,29 +1571,29 @@ msgid "Current bounties" msgstr "Recompensas actuales" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Name" msgstr "Nombre" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Status" msgstr "Estado" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Judge" msgstr "Juez" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Dev" msgstr "Desarrolladores" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Bounty" msgstr "Recompensas" @@ -1605,9 +1605,8 @@ msgstr "Frost para el almacenamiento de datos de I2P" #: i2p2www/pages/site/get-involved/bounties/index.html:40 #: i2p2www/pages/site/get-involved/bounties/index.html:47 #: i2p2www/pages/site/get-involved/bounties/index.html:54 -#: i2p2www/pages/site/get-involved/bounties/index.html:61 +#: i2p2www/pages/site/get-involved/bounties/index.html:75 #: i2p2www/pages/site/get-involved/bounties/index.html:82 -#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Proposal in development" msgstr "Proposición en desarrollo" @@ -1615,9 +1614,8 @@ msgstr "Proposición en desarrollo" #: i2p2www/pages/site/get-involved/bounties/index.html:42 #: i2p2www/pages/site/get-involved/bounties/index.html:49 #: i2p2www/pages/site/get-involved/bounties/index.html:56 -#: i2p2www/pages/site/get-involved/bounties/index.html:63 -#: i2p2www/pages/site/get-involved/bounties/index.html:84 -#: i2p2www/pages/site/get-involved/bounties/index.html:104 +#: i2p2www/pages/site/get-involved/bounties/index.html:77 +#: i2p2www/pages/site/get-involved/bounties/index.html:97 msgid "vacant" msgstr "vacante" @@ -1630,49 +1628,49 @@ msgid "Backporting Phex code onto I2PHex" msgstr "Portar el código de Phex dentro de I2PHex" #: i2p2www/pages/site/get-involved/bounties/index.html:53 -msgid "Make I2P IPv6 native" -msgstr "Hacer I2P IPV6 nativo" - -#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "I2P package in Debian and Ubuntu mirrors" msgstr "Paquetes I2P disponibles en los repositorios de Debian y Ubuntu" -#: i2p2www/pages/site/get-involved/bounties/index.html:67 +#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "Bitcoin client for I2P" msgstr "Cliente Bitcoin para I2P" -#: i2p2www/pages/site/get-involved/bounties/index.html:68 +#: i2p2www/pages/site/get-involved/bounties/index.html:61 msgid "Done, phase of verification" msgstr "Hecho, fase de verificación" -#: i2p2www/pages/site/get-involved/bounties/index.html:74 +#: i2p2www/pages/site/get-involved/bounties/index.html:67 msgid "Unit tests and Multi-router Simulation" msgstr "Unit tests y simulación multi-tuter" -#: i2p2www/pages/site/get-involved/bounties/index.html:75 +#: i2p2www/pages/site/get-involved/bounties/index.html:68 msgid "Partly done, partly in work, partly still open" msgstr "Parcialmente hecho, parcialmente trabajando, parcialmente aún abierto" -#: i2p2www/pages/site/get-involved/bounties/index.html:96 +#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding" msgstr "Recompensas paradas, paradas a causa de la desaparición de jrandom." -#: i2p2www/pages/site/get-involved/bounties/index.html:101 +#: i2p2www/pages/site/get-involved/bounties/index.html:94 msgid "Bundling bounties" msgstr "Ordenando las recompensas" -#: i2p2www/pages/site/get-involved/bounties/index.html:102 +#: i2p2www/pages/site/get-involved/bounties/index.html:95 msgid "Proposed" msgstr "Propuesto" -#: i2p2www/pages/site/get-involved/bounties/index.html:109 +#: i2p2www/pages/site/get-involved/bounties/index.html:102 msgid "Claimed bounties" msgstr "Recompensas reclamadas" -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Dev team" msgstr "Equipo de desarrollo" +#: i2p2www/pages/site/get-involved/bounties/index.html:107 +msgid "Make I2P IPv6 native" +msgstr "Hacer I2P IPV6 nativo" + #: i2p2www/pages/site/get-involved/bounties/index.html:114 msgid "Setting up a SILC server" msgstr "Configurar un servidor SILC" @@ -1734,7 +1732,7 @@ msgstr "" "ruters de I2P deben funcionar nativa y completamente con conexiones IPv6 " "como lo hacen con conexiones IPv4." -#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15 +#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20 msgid "" "For bounties to be declared done and paid, we need the plugin AND the " diff --git a/i2p2www/translations/es/LC_MESSAGES/priority.po b/i2p2www/translations/es/LC_MESSAGES/priority.po index b4a42fac3d50edc9fd41eed1c54e4e16dd420ea6..ff8aed69a51f4b4ccdfd21480304065dc64d333f 100644 --- a/i2p2www/translations/es/LC_MESSAGES/priority.po +++ b/i2p2www/translations/es/LC_MESSAGES/priority.po @@ -13,7 +13,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-19 14:19+0000\n" "Last-Translator: trolly\n" "Language-Team: Spanish " @@ -3321,22 +3321,26 @@ msgstr "" "vÃdeos, y manuales sobre I2P</a>." #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "Amigos de I2P" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "Más proyectos y documentación" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "Prensa" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "Anuncios, noticias y otros" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "Cosas muy antiguas" diff --git a/i2p2www/translations/fr/LC_MESSAGES/blog.po b/i2p2www/translations/fr/LC_MESSAGES/blog.po index 04a0281cd48535300d2e6eb85550d794945bda2f..0f4d04b5cd5fd3458ab337626aa51d165d586a42 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/blog.po +++ b/i2p2www/translations/fr/LC_MESSAGES/blog.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-08-12 10:32+0000\n" "Last-Translator: str4d <str4d@i2pmail.org>\n" "Language-Team: French " @@ -63,6 +63,7 @@ msgstr "`download page`" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101 msgid "RELEASE DETAILS" msgstr "DETAILS SUR CETTE VERSION" @@ -74,6 +75,7 @@ msgstr "DETAILS SUR CETTE VERSION" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103 msgid "Major Changes" msgstr "Changements majeurs" @@ -89,6 +91,7 @@ msgstr "Changements majeurs" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112 msgid "Bug Fixes" msgstr "Corrections de bugs" @@ -106,6 +109,7 @@ msgstr "Corrections de bugs" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118 msgid "Other" msgstr "Autre" @@ -123,6 +127,7 @@ msgstr "Autre" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129 msgid "SHA256 Checksums:" msgstr "Sommes de contrôle SHA256 :" @@ -253,6 +258,7 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127 msgid "Update GeoIP data (new installs and PPA only)" msgstr "Mise à jour données GeoIP (nouvelles installations et PPA seulement)" @@ -929,6 +935,7 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107 msgid "Anonymity Improvements" msgstr "" @@ -1083,3 +1090,207 @@ msgstr "" msgid "UPnP fix for some hardware" msgstr "" +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2 +#, fuzzy +msgid "0.9.8 Release" +msgstr "Release 0.9.4" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9 +msgid "" +"0.9.8 includes the long-awaited support for IPv6. It's enabled by " +"default, but of course you need a public IPv6 address to use it. " +"Configuration is on the 'network' configuration tab in your console. We " +"also have anonymity improvements including padding of SSU packets and " +"longer router private keys." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11 +#, python-format +msgid "30% of you will update via in-network torrent in this update cycle." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13 +msgid "IPv6 Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15 +msgid "" +"IPv6 is enabled and preferred by default. If you have a public IPv6 " +"address \n" +"and you are connecting to another router with a published IPv6 address, " +"it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet" +" in \n" +"the router console. If IPv6 is causing problems you may disable it there." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22 +msgid "" +"As a part of the IPv6 development effort, I2P now supports multiple \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, " +"IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The" +" \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you " +"have \n" +"multiple addresses you should review the configuration on /confignet and " +"adjust \n" +"it if necessary.\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on " +"/confignet,\n" +"we recommend that you use only one IPv4 and one IPv6 address. There are\n" +"bugs still to be fixed with multiple addresses of each type." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34 +msgid "" +"While IPv6 support was designed and developed over several years, it has" +" \n" +"only been tested by a limited number of users and is still beta. If you " +"do have \n" +"a public IPv6 address, please monitor your router and the logs for " +"problems, \n" +"and disable it necessary. Please report any bugs on \n" +"http://trac.i2p2.i2p." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42 +msgid "Rekeying Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44 +msgid "" +"For those of you running I2P on faster hardware (generally, 64-bit x86) " +"the \n" +"router will generate a new identity using longer keys. This will " +"substantially \n" +"reduce your participating traffic for 48 hours or more, while your router" +" \n" +"re-integrates into the network. Due to the new keys, the large number of" +" \n" +"torrent updates, and the recent network growth, we expect substantial \n" +"disruption to the network for a week or more after the update is " +"released. \n" +"Please be patient and things should start to improve after a few days." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54 +msgid "" +"These changes may result in higher CPU usage for some of you. We're doing" +" \n" +"our best to increase efficiency, but stronger security generally requires" +" more \n" +"computation. Performance may also be poor during the first week\n" +"due to the network churn.\n" +"We will evaluate the network performace before deciding whether to\n" +"change the key length on slower hardware in a future release." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63 +msgid "" +"We are experiencing rapid network growth in the last few weeks, which is" +" \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, " +"the \n" +"network is still performing fairly well, so keep spreading the word." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69 +msgid "More Changes Coming" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71 +msgid "" +"We're in the initial stages of desiging major changes to strengthen our \n" +"crypto. Stronger crypto will use more CPU and it may possibly \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P " +"on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but " +"some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no " +"longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " +"in \n" +"minimum requirements will be announced well in advance." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81 +msgid "New Website" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83 +msgid "" +"After a heroic effort by str4d, the new website preview is available at \n" +"http://i2hq.srv.i2p2.de. We hope to see it go live at \n" +"https://geti2p.net and http://www.i2p2.i2p soon. Please \n" +"contribute to the new website translations on Transifex, especially the \n" +"website_priority resource." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91 +msgid "Community Participation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93 +msgid "" +"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n" +"Last weekend, echelon attended the CTS IV conference in Berlin and\n" +"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" +"Several of us will be at 30C3 in Hamburg late this year.\n" +"It's great to see people participating at these events and representing " +"I2P." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105 +msgid "IPv6 support for both NTCP and SSU" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109 +msgid "SSU protocol obfuscation by adding random padding" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110 +msgid "Longer encryption and DH private keys for users on faster platforms" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114 +msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115 +msgid "Fix translation of HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116 +msgid "Fix occasional runtime exception in NTCP" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120 +msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 +msgid "Streaming: Improved recovery from lost acks, other fixes" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 +msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 +#, fuzzy +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, " +"Swedish, Turkish" +msgstr "Mises à jour de traduction : Italien, Portugais, Espagnol, Suédois" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 +msgid "New Romanian translation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126 +#, fuzzy +msgid "Wrapper 3.5.20 (new installs and PPA only)" +msgstr "Mise à jour données GeoIP (nouvelles installations et PPA seulement)" + diff --git a/i2p2www/translations/fr/LC_MESSAGES/docs.po b/i2p2www/translations/fr/LC_MESSAGES/docs.po index 4c5e65c3cd552f4bc0a4263aad527cd0f5bf5757..baeb749c7f6d4bd6cf9b70e10629b1a60caba001 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/docs.po +++ b/i2p2www/translations/fr/LC_MESSAGES/docs.po @@ -10,7 +10,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-30 15:19+0000\n" "Last-Translator: Towatowa441\n" "Language-Team: French " @@ -10210,11 +10210,57 @@ msgstr "" msgid "November 2010" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:6 -msgid "What do we mean by \"anonymous\"?" +#: i2p2www/pages/site/docs/how/threat-model.html:7 +msgid "low" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:8 +msgid "medium" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:9 +msgid "high" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:34 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "Damage Potential" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:35 +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "Reliability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:36 +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "Exploitability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:37 +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "Affected Users" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:38 +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "Discoverability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:39 +msgid "Severity" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:40 +#: i2p2www/pages/site/docs/protocol/i2np.html:94 +msgid "Priority" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:45 +msgid "What do we mean by \"anonymous\"?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:47 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" "to find out information you don't want them to know?\" - who you are, " @@ -10232,7 +10278,7 @@ msgid "" "data, to those fearful of discovery by powerful organizations or states." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:19 +#: i2p2www/pages/site/docs/how/threat-model.html:58 msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" @@ -10241,7 +10287,7 @@ msgid "" "so that you may decide whether it meets your needs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:26 +#: i2p2www/pages/site/docs/how/threat-model.html:65 msgid "" "We welcome further research and analysis on I2P's resistance to the " "threats described below.\n" @@ -10250,11 +10296,11 @@ msgid "" "work focused on I2P is needed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:32 +#: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "Network Topology Summary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:33 +#: i2p2www/pages/site/docs/how/threat-model.html:72 #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" @@ -10263,7 +10309,7 @@ msgid "" "reviewing related literature:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:39 +#: i2p2www/pages/site/docs/how/threat-model.html:78 msgid "" "<b>I2P is a free route mixnet</b> - the message creator explicitly " "defines the\n" @@ -10274,7 +10320,7 @@ msgid "" "inbound tunnel)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:45 +#: i2p2www/pages/site/docs/how/threat-model.html:84 msgid "" "<b>I2P has no official entry and exit points</b> - all peers fully " "participate in the \n" @@ -10282,7 +10328,7 @@ msgid "" "application layer, a few proxies do exist)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:50 +#: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" "<b>I2P is fully distributed</b> - there are no central controls or " "authorities.\n" @@ -10297,7 +10343,7 @@ msgid "" "anonymity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:60 +#: i2p2www/pages/site/docs/how/threat-model.html:99 #, python-format msgid "" "We have documented plans to implement <a " @@ -10316,7 +10362,7 @@ msgid "" "delay features." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:71 +#: i2p2www/pages/site/docs/how/threat-model.html:110 msgid "" "In theory, routers along the message path may inject an \n" "arbitrary number of hops before forwarding the message to the next peer, " @@ -10324,11 +10370,11 @@ msgid "" "the current implementation does not." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:78 -msgid "The Threat Model (Attacks)" +#: i2p2www/pages/site/docs/how/threat-model.html:117 +msgid "The Threat Model" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:79 +#: i2p2www/pages/site/docs/how/threat-model.html:118 msgid "" "I2P design started in 2003, not long after the advent of\n" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" @@ -10340,7 +10386,7 @@ msgid "" "from the significant academic interest in Tor." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:89 +#: i2p2www/pages/site/docs/how/threat-model.html:128 msgid "" "Taking from the attacks and analysis put forth in the \n" "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " @@ -10353,14 +10399,14 @@ msgid "" "this list to include new attacks as they are identified." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:98 +#: i2p2www/pages/site/docs/how/threat-model.html:137 msgid "" "Included are some attacks that may be unique to I2P.\n" "We do not have good answers for all these attacks, however\n" "we continue to do research and improve our defenses." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:104 +#: i2p2www/pages/site/docs/how/threat-model.html:143 msgid "" "In addition, many of these attacks are significantly easier than\n" "they should be, due to the modest size of the current network.\n" @@ -10371,7 +10417,7 @@ msgid "" "these attacks will become much harder." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:114 +#: i2p2www/pages/site/docs/how/threat-model.html:153 #, python-format msgid "" "The\n" @@ -10381,98 +10427,133 @@ msgid "" "to review." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:121 -msgid "Index" -msgstr "Index" +#: i2p2www/pages/site/docs/how/threat-model.html:160 +#, python-format +msgid "" +"Attacks are judged using the <a href=\"%(DREAD)s\">modified " +"<strong>DREAD</strong> model</a>:" +msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:123 -#: i2p2www/pages/site/docs/how/threat-model.html:143 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "If a threat exploit occurs, how much damage will be caused?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "How reliable is the attack?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "What is needed to exploit this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "How many users will be affected?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "How easy is it to discover this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:172 +#, python-format +msgid "" +"Each category is given a rating of low, medium or high. The severity\n" +"and priority scores are calculated using the equations outlined\n" +"<a href=\"%(DREAD)s\">here</a>." +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:178 +msgid "Index of Attacks" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:180 +#: i2p2www/pages/site/docs/how/threat-model.html:200 msgid "Brute force attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:124 -#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:181 +#: i2p2www/pages/site/docs/how/threat-model.html:244 msgid "Timing attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:125 -#: i2p2www/pages/site/docs/how/threat-model.html:220 +#: i2p2www/pages/site/docs/how/threat-model.html:182 +#: i2p2www/pages/site/docs/how/threat-model.html:281 msgid "Intersection attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:126 -#: i2p2www/pages/site/docs/how/threat-model.html:298 +#: i2p2www/pages/site/docs/how/threat-model.html:183 +#: i2p2www/pages/site/docs/how/threat-model.html:361 msgid "Denial of service attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:127 -#: i2p2www/pages/site/docs/how/threat-model.html:385 +#: i2p2www/pages/site/docs/how/threat-model.html:184 +#: i2p2www/pages/site/docs/how/threat-model.html:460 msgid "Tagging attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:128 -#: i2p2www/pages/site/docs/how/threat-model.html:400 +#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:478 msgid "Partitioning attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:129 -#: i2p2www/pages/site/docs/how/threat-model.html:438 +#: i2p2www/pages/site/docs/how/threat-model.html:186 +#: i2p2www/pages/site/docs/how/threat-model.html:518 msgid "Predecessor attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:130 -#: i2p2www/pages/site/docs/how/threat-model.html:481 +#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:563 msgid "Harvesting attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:131 -#: i2p2www/pages/site/docs/how/threat-model.html:525 +#: i2p2www/pages/site/docs/how/threat-model.html:188 +#: i2p2www/pages/site/docs/how/threat-model.html:610 msgid "Identification Through Traffic Analysis" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:132 -#: i2p2www/pages/site/docs/how/threat-model.html:582 +#: i2p2www/pages/site/docs/how/threat-model.html:189 +#: i2p2www/pages/site/docs/how/threat-model.html:670 msgid "Sybil attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:133 -#: i2p2www/pages/site/docs/how/threat-model.html:629 +#: i2p2www/pages/site/docs/how/threat-model.html:190 +#: i2p2www/pages/site/docs/how/threat-model.html:719 msgid "Buddy Exhaustion attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:134 -#: i2p2www/pages/site/docs/how/threat-model.html:651 +#: i2p2www/pages/site/docs/how/threat-model.html:191 +#: i2p2www/pages/site/docs/how/threat-model.html:744 msgid "Cryptographic attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:135 +#: i2p2www/pages/site/docs/how/threat-model.html:192 msgid "Floodfill attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:136 -#: i2p2www/pages/site/docs/how/threat-model.html:707 +#: i2p2www/pages/site/docs/how/threat-model.html:193 +#: i2p2www/pages/site/docs/how/threat-model.html:805 msgid "Other Network Database attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:137 +#: i2p2www/pages/site/docs/how/threat-model.html:194 msgid "Attacks on centralized resources" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:138 -#: i2p2www/pages/site/docs/how/threat-model.html:770 +#: i2p2www/pages/site/docs/how/threat-model.html:195 +#: i2p2www/pages/site/docs/how/threat-model.html:871 msgid "Development attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:139 +#: i2p2www/pages/site/docs/how/threat-model.html:196 msgid "Implementation attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:140 -#: i2p2www/pages/site/docs/how/threat-model.html:849 +#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:955 msgid "Other Defenses" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:145 +#: i2p2www/pages/site/docs/how/threat-model.html:204 msgid "" "A brute force attack can be mounted by a global passive or active " "adversary, \n" @@ -10493,7 +10574,7 @@ msgid "" "message)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:157 +#: i2p2www/pages/site/docs/how/threat-model.html:216 msgid "" "However, a powerful attacker can use brute force to detect trends - if " "they \n" @@ -10520,7 +10601,7 @@ msgid "" "not currently implemented." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:174 +#: i2p2www/pages/site/docs/how/threat-model.html:233 #, python-format msgid "" "As a partial defense against a single router or group of routers trying " @@ -10533,7 +10614,7 @@ msgid "" "<a href=\"%(peerselection)s\">peer selection page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:248 msgid "" "I2P's messages are unidirectional and do not necessarily imply that a " "reply\n" @@ -10549,7 +10630,7 @@ msgid "" "slow to have passed the message along." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:258 msgid "" "This sort of attack is powerful, but its applicability to I2P is non " "obvious,\n" @@ -10567,7 +10648,7 @@ msgid "" "DataMessage+DeliveryStatusMessage)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:207 +#: i2p2www/pages/site/docs/how/threat-model.html:268 #, python-format msgid "" "Without protocol scrubbing or higher latency, global active adversaries " @@ -10583,14 +10664,14 @@ msgid "" "but these are unimplemented in I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:216 +#: i2p2www/pages/site/docs/how/threat-model.html:277 #, python-format msgid "" "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against " "Anonymous Systems</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:222 +#: i2p2www/pages/site/docs/how/threat-model.html:285 msgid "" "Intersection attacks against low latency systems are extremely powerful -" "\n" @@ -10606,7 +10687,7 @@ msgid "" "scenarios." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:232 +#: i2p2www/pages/site/docs/how/threat-model.html:295 #, python-format msgid "" "In summary, if an attacker is at both ends of your tunnel at the same " @@ -10617,61 +10698,61 @@ msgid "" "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:240 +#: i2p2www/pages/site/docs/how/threat-model.html:303 msgid "Partial defenses implemented in I2P:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:244 +#: i2p2www/pages/site/docs/how/threat-model.html:307 #, python-format msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:247 +#: i2p2www/pages/site/docs/how/threat-model.html:310 #, python-format msgid "" "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " "small group that changes slowly" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:250 +#: i2p2www/pages/site/docs/how/threat-model.html:313 msgid "Limits on the number of tunnels routed through a single peer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:253 +#: i2p2www/pages/site/docs/how/threat-model.html:316 msgid "" "Prevention of peers from the same /16 IP range from being members of a " "single tunnel" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:256 +#: i2p2www/pages/site/docs/how/threat-model.html:319 msgid "" "For eepsites or other hosted services, we support\n" "simultaneous hosting on multiple routers, or\n" "<a href=\"#intersection\">multihoming</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:263 +#: i2p2www/pages/site/docs/how/threat-model.html:326 msgid "" "Even in total, these defenses are not a complete solution.\n" "Also, we have made some design choices that may significantly increase " "our vulnerability:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:268 +#: i2p2www/pages/site/docs/how/threat-model.html:331 msgid "We do not use low-bandwidth \"guard nodes\"" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:271 +#: i2p2www/pages/site/docs/how/threat-model.html:334 msgid "" "We use tunnel pools comprised of several tunnels, and traffic can shift " "from tunnel to tunnel." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:274 +#: i2p2www/pages/site/docs/how/threat-model.html:337 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:277 +#: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" "Tunnel lengths are configurable.\n" "While 3-hop tunnels are recommended for full protection, several " @@ -10679,7 +10760,7 @@ msgid "" "services use 2-hop tunnels by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:284 +#: i2p2www/pages/site/docs/how/threat-model.html:347 #, python-format msgid "" "In the future, it could\n" @@ -10694,26 +10775,26 @@ msgid "" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:293 +#: i2p2www/pages/site/docs/how/threat-model.html:356 #, python-format msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:300 +#: i2p2www/pages/site/docs/how/threat-model.html:363 msgid "" "There are a whole slew of denial of service attacks available against " "I2P,\n" "each with different costs and consequences:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:305 +#: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" "<b>Greedy user attack:</b> This is simply\n" "people trying to consume significantly more resources than they are \n" "willing to contribute. The defense against this is:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:311 +#: i2p2www/pages/site/docs/how/threat-model.html:375 #, python-format msgid "" "Set defaults so that most users provide resources to the network.\n" @@ -10722,7 +10803,7 @@ msgid "" "over 95% of I2P users relay traffic for others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:317 +#: i2p2www/pages/site/docs/how/threat-model.html:381 msgid "" "Provide easy configuration options so that users may increase their\n" "contribution (share percentage) to the network. Display easy-to-" @@ -10731,13 +10812,13 @@ msgid "" "contributing." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:322 +#: i2p2www/pages/site/docs/how/threat-model.html:386 msgid "" "Maintain a strong community with blogs, forums, IRC, and other means of " "communication." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:327 +#: i2p2www/pages/site/docs/how/threat-model.html:393 #, python-format msgid "" "<b>Starvation attack:</b> A hostile user may attempt to harm the network " @@ -10766,7 +10847,7 @@ msgid "" "significant efforts required in this area." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:344 +#: i2p2www/pages/site/docs/how/threat-model.html:413 #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" @@ -10797,7 +10878,7 @@ msgid "" "operation</a> is implemented)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:360 +#: i2p2www/pages/site/docs/how/threat-model.html:432 msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" @@ -10812,7 +10893,7 @@ msgid "" "bugs in the implementation." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:370 +#: i2p2www/pages/site/docs/how/threat-model.html:445 #, python-format msgid "" "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " @@ -10828,7 +10909,7 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:386 +#: i2p2www/pages/site/docs/how/threat-model.html:464 #, python-format msgid "" "Tagging attacks - modifying a message so that it can later be identified" @@ -10854,7 +10935,7 @@ msgid "" "as the links are encrypted and messages signed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:402 +#: i2p2www/pages/site/docs/how/threat-model.html:482 msgid "" "Partitioning attacks - finding ways to segregate (technically or " "analytically)\n" @@ -10883,7 +10964,7 @@ msgid "" "the moment)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:418 +#: i2p2www/pages/site/docs/how/threat-model.html:498 #, python-format msgid "" "Partitioning the network analytically by looking for differences in how " @@ -10913,14 +10994,14 @@ msgid "" "which other tunnels or messages have those delays)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:434 +#: i2p2www/pages/site/docs/how/threat-model.html:514 #, python-format msgid "" "Also discussed on the <a href=\"%(netdb)s#threat\">network database " "page</a> (bootstrap attack)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:440 +#: i2p2www/pages/site/docs/how/threat-model.html:522 msgid "" "The predecessor attack is passively gathering statistics in an attempt to" " see\n" @@ -10937,7 +11018,7 @@ msgid "" "target is located." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:450 +#: i2p2www/pages/site/docs/how/threat-model.html:532 #, python-format msgid "" "I2P avoids this in four ways: first, the peers selected to participate in" @@ -10962,7 +11043,7 @@ msgid "" "attackers will merely run into that gateway." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:467 +#: i2p2www/pages/site/docs/how/threat-model.html:549 #, python-format msgid "" "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n" @@ -10970,7 +11051,7 @@ msgid "" "See also <a href=\"#intersection\">the intersection attack</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:473 +#: i2p2www/pages/site/docs/how/threat-model.html:555 #, python-format msgid "" "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n" @@ -10978,7 +11059,7 @@ msgid "" "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:482 +#: i2p2www/pages/site/docs/how/threat-model.html:567 msgid "" "\"Harvesting\" means compiling a list of users running I2P.\n" "It can be used for legal attacks and to help\n" @@ -10986,7 +11067,7 @@ msgid "" "harvesting whatever references to other peers it can find." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:489 +#: i2p2www/pages/site/docs/how/threat-model.html:574 msgid "" "I2P itself is not designed with effective defenses against\n" "this attack, since there is the distributed network database \n" @@ -10994,17 +11075,17 @@ msgid "" "The following factors make the attack somewhat harder in practice:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:496 +#: i2p2www/pages/site/docs/how/threat-model.html:581 msgid "" "Network growth will make it more difficult to obtain a given proportion " "of the network" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:499 +#: i2p2www/pages/site/docs/how/threat-model.html:584 msgid "Floodfill routers implement query limits as DOS protection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:502 +#: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" "\"Hidden mode\", which prevents a router from publishing its information " "to the netDb,\n" @@ -11012,7 +11093,7 @@ msgid "" "could be." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:508 +#: i2p2www/pages/site/docs/how/threat-model.html:593 #, python-format msgid "" "In future implementations,\n" @@ -11026,7 +11107,7 @@ msgid "" "they can be reached (as well as their public keys, etc)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:517 +#: i2p2www/pages/site/docs/how/threat-model.html:602 msgid "" "In the future, routers could use GeoIP to identify if they are in a " "particular\n" @@ -11035,7 +11116,7 @@ msgid "" "enact other restricted route methods." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:526 +#: i2p2www/pages/site/docs/how/threat-model.html:614 #, python-format msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" @@ -11049,21 +11130,21 @@ msgid "" "make it somewhat difficult to identify I2P traffic:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:536 +#: i2p2www/pages/site/docs/how/threat-model.html:624 msgid "Random port selection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:539 +#: i2p2www/pages/site/docs/how/threat-model.html:627 msgid "Point-to-Point Encryption of all traffic" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:542 +#: i2p2www/pages/site/docs/how/threat-model.html:630 msgid "" "DH key exchange with no protocol bytes or other unencrypted constant " "fields" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:545 +#: i2p2www/pages/site/docs/how/threat-model.html:633 #, python-format msgid "" "Simultaneous use of both\n" @@ -11073,54 +11154,54 @@ msgid "" " track." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:553 +#: i2p2www/pages/site/docs/how/threat-model.html:641 msgid "" "In the near future, we plan to directly address traffic analysis issues " "by further obfuscation of I2P transport protocols, possibly including:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:557 +#: i2p2www/pages/site/docs/how/threat-model.html:645 msgid "" "Padding at the transport layer to random lengths, especially during the " "connection handshake" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:560 +#: i2p2www/pages/site/docs/how/threat-model.html:648 msgid "" "Study of packet size distribution signatures, and additional padding as " "necessary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:563 +#: i2p2www/pages/site/docs/how/threat-model.html:651 msgid "" "Development of additional transport methods that mimic SSL or other " "common protocols" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:566 +#: i2p2www/pages/site/docs/how/threat-model.html:654 msgid "" "Review of padding strategies at higher layers to see how they affect " "packet sizes at the transport layer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:569 +#: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" "Review of methods implemented by various state-level firewalls to block " "Tor" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:572 +#: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "Working directly with DPI and obfuscation experts" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:577 +#: i2p2www/pages/site/docs/how/threat-model.html:665 #, python-format msgid "" "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol " "Obfuscation</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:584 +#: i2p2www/pages/site/docs/how/threat-model.html:674 msgid "" "Sybil describes a category of attacks where the adversary creates " "arbitrarily\n" @@ -11150,15 +11231,15 @@ msgid "" "scarcity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:602 +#: i2p2www/pages/site/docs/how/threat-model.html:692 msgid "Requiring HashCash Certificates in various places has two major problems:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:606 +#: i2p2www/pages/site/docs/how/threat-model.html:696 msgid "Maintaining backward compatibility" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:609 +#: i2p2www/pages/site/docs/how/threat-model.html:699 msgid "" "The classic HashCash problem -\n" "selecting HashCash values that are meaningful proofs of work on high-end " @@ -11166,7 +11247,7 @@ msgid "" "while still being feasible on low-end machines such as mobile devices." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:616 +#: i2p2www/pages/site/docs/how/threat-model.html:706 msgid "" "Various limitations on the number of routers in a given IP range restrict" "\n" @@ -11176,21 +11257,21 @@ msgid "" "However, this is not a meaningful defense against a powerful adversary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:623 +#: i2p2www/pages/site/docs/how/threat-model.html:713 #, python-format msgid "" "See the <a href=\"%(netdb)s#threat\">network database page</a>\n" "for more Sybil discussion." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:630 +#: i2p2www/pages/site/docs/how/threat-model.html:723 #, python-format msgid "" "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure " "Lookup</a> Section 5.2)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:634 +#: i2p2www/pages/site/docs/how/threat-model.html:727 #, python-format msgid "" "By refusing to accept or forward tunnel build requests, except to a " @@ -11213,7 +11294,7 @@ msgid "" "Further research and defenses may be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:653 +#: i2p2www/pages/site/docs/how/threat-model.html:748 #, python-format msgid "" "We use strong cryptography with long keys, and\n" @@ -11241,7 +11322,7 @@ msgid "" "shared secret values while maintaining backward compatibility." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:672 +#: i2p2www/pages/site/docs/how/threat-model.html:767 #, python-format msgid "" "Upgrading the various data structures and protocols to support longer " @@ -11254,7 +11335,7 @@ msgid "" "implement mechanisms to make it easier for future transitions." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:681 +#: i2p2www/pages/site/docs/how/threat-model.html:776 msgid "" "In the future, several I2P protocols and data structures\n" "support securely padding messages to arbitrary sizes, so messages could " @@ -11266,11 +11347,11 @@ msgid "" "end to end messages include simple random padding." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:691 +#: i2p2www/pages/site/docs/how/threat-model.html:786 msgid "Floodfill Anonymity attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:692 +#: i2p2www/pages/site/docs/how/threat-model.html:790 #, python-format msgid "" "In addition to the floodfill DOS attacks described\n" @@ -11290,7 +11371,7 @@ msgid "" " future research." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:708 +#: i2p2www/pages/site/docs/how/threat-model.html:806 #, python-format msgid "" "A hostile user may attempt to harm the network by\n" @@ -11300,11 +11381,11 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:718 +#: i2p2www/pages/site/docs/how/threat-model.html:816 msgid "Central Resource Attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:719 +#: i2p2www/pages/site/docs/how/threat-model.html:820 msgid "" "There are a few centralized or limited resources (some inside I2P, some " "not)\n" @@ -11319,14 +11400,14 @@ msgid "" "not the operation of the network itself." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:729 +#: i2p2www/pages/site/docs/how/threat-model.html:830 #, python-format msgid "" "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" " for external public access." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:732 +#: i2p2www/pages/site/docs/how/threat-model.html:833 #, python-format msgid "" "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " @@ -11336,17 +11417,17 @@ msgid "" "reseed hosts may need improvement." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:737 +#: i2p2www/pages/site/docs/how/threat-model.html:838 msgid "" "Routers now support multiple update file locations.\n" "A malicious update host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:741 +#: i2p2www/pages/site/docs/how/threat-model.html:842 msgid "Routers now support multiple default trusted update signers." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:744 +#: i2p2www/pages/site/docs/how/threat-model.html:845 msgid "" "Routers now better handle <a href=\"#ffdos\">multiple unreliable " "floodfill peers</a>.\n" @@ -11354,21 +11435,21 @@ msgid "" "href=\"#floodfill\">more</a> study." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:748 +#: i2p2www/pages/site/docs/how/threat-model.html:849 #, python-format msgid "" "The code is now stored in a <a href=\"%(monotone)s\">distributed source " "control system</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:751 +#: i2p2www/pages/site/docs/how/threat-model.html:852 msgid "" "Routers rely on a single news host, but there is a hardcoded backup URL " "pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:755 +#: i2p2www/pages/site/docs/how/threat-model.html:856 #, python-format msgid "" "<a href=\"%(naming)s\">Naming system services</a>, including addressbook " @@ -11381,7 +11462,7 @@ msgid "" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:762 +#: i2p2www/pages/site/docs/how/threat-model.html:863 msgid "" "We remain reliant on the DNS service for i2p2.de, losing this would cause" " substantial\n" @@ -11390,7 +11471,7 @@ msgid "" "loss of i2p.net did." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:772 +#: i2p2www/pages/site/docs/how/threat-model.html:875 msgid "" "These attacks aren't directly on the network, but instead go after its " "development team \n" @@ -11406,11 +11487,11 @@ msgid "" "have a big problem." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:781 +#: i2p2www/pages/site/docs/how/threat-model.html:884 msgid "However, two techniques help defend against these attacks:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:785 +#: i2p2www/pages/site/docs/how/threat-model.html:888 #, python-format msgid "" "All components of the network must be open source to enable inspection, " @@ -11426,7 +11507,7 @@ msgid "" "to restrict modifications to those previously approved." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:793 +#: i2p2www/pages/site/docs/how/threat-model.html:896 #, python-format msgid "" "Development over the network itself, allowing developers to stay " @@ -11440,18 +11521,18 @@ msgid "" "all available within I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:804 +#: i2p2www/pages/site/docs/how/threat-model.html:907 msgid "" "We also maintain relationships with various organizations that offer " "legal advice,\n" "should any defense be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:809 +#: i2p2www/pages/site/docs/how/threat-model.html:912 msgid "Implementation attacks (bugs)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:810 +#: i2p2www/pages/site/docs/how/threat-model.html:916 msgid "" "Try as we might, most nontrivial applications include errors in the " "design or \n" @@ -11468,7 +11549,7 @@ msgid "" "obscurity</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:821 +#: i2p2www/pages/site/docs/how/threat-model.html:927 msgid "" "In addition, the code is being \n" "treated the same way, with little aversion towards reworking or throwing " @@ -11484,7 +11565,7 @@ msgid "" "enough to identify shortcomings and bugs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:831 +#: i2p2www/pages/site/docs/how/threat-model.html:937 msgid "" "Our software is likely, in particular, to contain bugs related to denial " "of service\n" @@ -11494,7 +11575,7 @@ msgid "" "protocols." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:837 +#: i2p2www/pages/site/docs/how/threat-model.html:943 #, python-format msgid "" "I2P is still a small network with a small development community and " @@ -11506,11 +11587,11 @@ msgid "" "<a href=\"%(volunteer)s\">get involved</a> and help." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:850 +#: i2p2www/pages/site/docs/how/threat-model.html:956 msgid "Blocklists" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:851 +#: i2p2www/pages/site/docs/how/threat-model.html:957 msgid "" "To some extent, I2P could be enhanced to avoid peers operating at IP " "addresses\n" @@ -11520,7 +11601,7 @@ msgid "" "others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:857 +#: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" "To the extent that active peers actually do show up in the actual " "blocklist,\n" @@ -11530,7 +11611,7 @@ msgid "" "enable it by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:865 +#: i2p2www/pages/site/docs/how/threat-model.html:971 msgid "" "Blocklists are only a part (perhaps a small part) of an array of defenses" "\n" @@ -11541,7 +11622,7 @@ msgid "" "list above there are improvements we can make in detecting badness." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:874 +#: i2p2www/pages/site/docs/how/threat-model.html:980 msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" @@ -11551,7 +11632,7 @@ msgid "" "the i2p network down. Completely." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:882 +#: i2p2www/pages/site/docs/how/threat-model.html:988 msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" @@ -12781,10 +12862,6 @@ msgstr "" msgid "Type" msgstr "" -#: i2p2www/pages/site/docs/protocol/i2np.html:94 -msgid "Priority" -msgstr "" - #: i2p2www/pages/site/docs/protocol/i2np.html:95 msgid "Comments" msgstr "" diff --git a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po index f5e8e6dfe109f3bc62c5ced14cc1cd6e4cc6e666..90ff4eb8c46d43c2f1d983054c419c60ef96b905 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po @@ -10,7 +10,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-22 17:33+0000\n" "Last-Translator: Towatowa441\n" "Language-Team: French " @@ -1223,29 +1223,29 @@ msgid "Current bounties" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Name" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Status" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Judge" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Dev" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Bounty" msgstr "" @@ -1257,9 +1257,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:40 #: i2p2www/pages/site/get-involved/bounties/index.html:47 #: i2p2www/pages/site/get-involved/bounties/index.html:54 -#: i2p2www/pages/site/get-involved/bounties/index.html:61 +#: i2p2www/pages/site/get-involved/bounties/index.html:75 #: i2p2www/pages/site/get-involved/bounties/index.html:82 -#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Proposal in development" msgstr "" @@ -1267,9 +1266,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:42 #: i2p2www/pages/site/get-involved/bounties/index.html:49 #: i2p2www/pages/site/get-involved/bounties/index.html:56 -#: i2p2www/pages/site/get-involved/bounties/index.html:63 -#: i2p2www/pages/site/get-involved/bounties/index.html:84 -#: i2p2www/pages/site/get-involved/bounties/index.html:104 +#: i2p2www/pages/site/get-involved/bounties/index.html:77 +#: i2p2www/pages/site/get-involved/bounties/index.html:97 msgid "vacant" msgstr "" @@ -1282,49 +1280,49 @@ msgid "Backporting Phex code onto I2PHex" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:53 -msgid "Make I2P IPv6 native" -msgstr "" - -#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "I2P package in Debian and Ubuntu mirrors" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:67 +#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "Bitcoin client for I2P" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:68 +#: i2p2www/pages/site/get-involved/bounties/index.html:61 msgid "Done, phase of verification" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:74 +#: i2p2www/pages/site/get-involved/bounties/index.html:67 msgid "Unit tests and Multi-router Simulation" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:75 +#: i2p2www/pages/site/get-involved/bounties/index.html:68 msgid "Partly done, partly in work, partly still open" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:96 +#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:101 +#: i2p2www/pages/site/get-involved/bounties/index.html:94 msgid "Bundling bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:102 +#: i2p2www/pages/site/get-involved/bounties/index.html:95 msgid "Proposed" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:109 +#: i2p2www/pages/site/get-involved/bounties/index.html:102 msgid "Claimed bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Dev team" msgstr "" +#: i2p2www/pages/site/get-involved/bounties/index.html:107 +msgid "Make I2P IPv6 native" +msgstr "" + #: i2p2www/pages/site/get-involved/bounties/index.html:114 msgid "Setting up a SILC server" msgstr "" @@ -1379,7 +1377,7 @@ msgid "" "IPv6 connections like it does on IPv4." msgstr "" -#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15 +#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20 msgid "" "For bounties to be declared done and paid, we need the plugin AND the " diff --git a/i2p2www/translations/fr/LC_MESSAGES/priority.po b/i2p2www/translations/fr/LC_MESSAGES/priority.po index f8b7d59e0cd0f39be2b4a203d6719d266e0b7a07..83896114370768a093271c8b3e986c5a1a2c1c61 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/priority.po +++ b/i2p2www/translations/fr/LC_MESSAGES/priority.po @@ -10,7 +10,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-30 15:06+0000\n" "Last-Translator: Towatowa441\n" "Language-Team: French " @@ -3519,22 +3519,26 @@ msgstr "" "tutoriels au sujet de I2P</a>." #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "Amis de I2P" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "Davantage de projets et documentation" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "Presse" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "Forums, actualités sur ce site web, autres" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "Très vieilles choses" diff --git a/i2p2www/translations/pt/LC_MESSAGES/priority.po b/i2p2www/translations/pt/LC_MESSAGES/priority.po index 042a1c6eaadd9182c76cf3369a5cde838bb539f8..6062586af67e369f308fa71df48967a49cd442a3 100644 --- a/i2p2www/translations/pt/LC_MESSAGES/priority.po +++ b/i2p2www/translations/pt/LC_MESSAGES/priority.po @@ -10,7 +10,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-16 13:04+0000\n" "Last-Translator: str4d <str4d@i2pmail.org>\n" "Language-Team: Portuguese " @@ -2723,22 +2723,26 @@ msgid "" msgstr "" #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "" diff --git a/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po b/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po index e7c172a84a8d7e1dc39f0144f284c331c81af328..c7a0ec2497354564c383dda9cb244db1e5975459 100644 --- a/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po +++ b/i2p2www/translations/ru_RU/LC_MESSAGES/blog.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-18 15:02+0000\n" "Last-Translator: keedley <zhopa@mita.pp.ru>\n" "Language-Team: Russian (Russia) " @@ -64,6 +64,7 @@ msgstr "`Ñтраница загрузки`" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101 msgid "RELEASE DETAILS" msgstr "ПОДРОБÐОСТИ РЕЛИЗÐ" @@ -75,6 +76,7 @@ msgstr "ПОДРОБÐОСТИ РЕЛИЗÐ" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103 msgid "Major Changes" msgstr "ОÑновные изменениÑ" @@ -90,6 +92,7 @@ msgstr "ОÑновные изменениÑ" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112 msgid "Bug Fixes" msgstr "ИÑправлены ошибки" @@ -107,6 +110,7 @@ msgstr "ИÑправлены ошибки" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118 msgid "Other" msgstr "Другое" @@ -124,6 +128,7 @@ msgstr "Другое" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129 msgid "SHA256 Checksums:" msgstr "Ключевые Ñуммы SHA256" @@ -282,6 +287,7 @@ msgstr "Враппер обновлен до 3.5.15 (Ð´Ð»Ñ Ð½Ð¾Ð²Ñ‹Ñ… инÑÑ‚ #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127 msgid "Update GeoIP data (new installs and PPA only)" msgstr "Обновлены данные GeoIP (Ð´Ð»Ñ Ð½Ð¾Ð²Ñ‹Ñ… инÑталлÑций и PPA)" @@ -1040,6 +1046,7 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107 msgid "Anonymity Improvements" msgstr "" @@ -1194,3 +1201,210 @@ msgstr "" msgid "UPnP fix for some hardware" msgstr "" +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2 +#, fuzzy +msgid "0.9.8 Release" +msgstr "ВерÑÐ¸Ñ 0.9.7" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9 +msgid "" +"0.9.8 includes the long-awaited support for IPv6. It's enabled by " +"default, but of course you need a public IPv6 address to use it. " +"Configuration is on the 'network' configuration tab in your console. We " +"also have anonymity improvements including padding of SSU packets and " +"longer router private keys." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11 +#, python-format +msgid "30% of you will update via in-network torrent in this update cycle." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13 +msgid "IPv6 Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15 +msgid "" +"IPv6 is enabled and preferred by default. If you have a public IPv6 " +"address \n" +"and you are connecting to another router with a published IPv6 address, " +"it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet" +" in \n" +"the router console. If IPv6 is causing problems you may disable it there." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22 +msgid "" +"As a part of the IPv6 development effort, I2P now supports multiple \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, " +"IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The" +" \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you " +"have \n" +"multiple addresses you should review the configuration on /confignet and " +"adjust \n" +"it if necessary.\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on " +"/confignet,\n" +"we recommend that you use only one IPv4 and one IPv6 address. There are\n" +"bugs still to be fixed with multiple addresses of each type." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34 +msgid "" +"While IPv6 support was designed and developed over several years, it has" +" \n" +"only been tested by a limited number of users and is still beta. If you " +"do have \n" +"a public IPv6 address, please monitor your router and the logs for " +"problems, \n" +"and disable it necessary. Please report any bugs on \n" +"http://trac.i2p2.i2p." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42 +msgid "Rekeying Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44 +msgid "" +"For those of you running I2P on faster hardware (generally, 64-bit x86) " +"the \n" +"router will generate a new identity using longer keys. This will " +"substantially \n" +"reduce your participating traffic for 48 hours or more, while your router" +" \n" +"re-integrates into the network. Due to the new keys, the large number of" +" \n" +"torrent updates, and the recent network growth, we expect substantial \n" +"disruption to the network for a week or more after the update is " +"released. \n" +"Please be patient and things should start to improve after a few days." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54 +msgid "" +"These changes may result in higher CPU usage for some of you. We're doing" +" \n" +"our best to increase efficiency, but stronger security generally requires" +" more \n" +"computation. Performance may also be poor during the first week\n" +"due to the network churn.\n" +"We will evaluate the network performace before deciding whether to\n" +"change the key length on slower hardware in a future release." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63 +msgid "" +"We are experiencing rapid network growth in the last few weeks, which is" +" \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, " +"the \n" +"network is still performing fairly well, so keep spreading the word." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69 +#, fuzzy +msgid "More Changes Coming" +msgstr "ОÑновные изменениÑ" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71 +msgid "" +"We're in the initial stages of desiging major changes to strengthen our \n" +"crypto. Stronger crypto will use more CPU and it may possibly \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P " +"on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but " +"some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no " +"longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " +"in \n" +"minimum requirements will be announced well in advance." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81 +msgid "New Website" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83 +msgid "" +"After a heroic effort by str4d, the new website preview is available at \n" +"http://i2hq.srv.i2p2.de. We hope to see it go live at \n" +"https://geti2p.net and http://www.i2p2.i2p soon. Please \n" +"contribute to the new website translations on Transifex, especially the \n" +"website_priority resource." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91 +msgid "Community Participation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93 +msgid "" +"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n" +"Last weekend, echelon attended the CTS IV conference in Berlin and\n" +"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" +"Several of us will be at 30C3 in Hamburg late this year.\n" +"It's great to see people participating at these events and representing " +"I2P." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105 +msgid "IPv6 support for both NTCP and SSU" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109 +msgid "SSU protocol obfuscation by adding random padding" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110 +msgid "Longer encryption and DH private keys for users on faster platforms" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114 +msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115 +msgid "Fix translation of HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116 +msgid "Fix occasional runtime exception in NTCP" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120 +msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 +msgid "Streaming: Improved recovery from lost acks, other fixes" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 +msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 +#, fuzzy +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, " +"Swedish, Turkish" +msgstr "" +"Обновлены переводы: китайÑкий, французÑкий, немецкий, итальÑнÑкий, " +"польÑкий, португальÑкий, шведÑкий и украинÑкий" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 +msgid "New Romanian translation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126 +#, fuzzy +msgid "Wrapper 3.5.20 (new installs and PPA only)" +msgstr "Обновить враппер до 3.5.17 (новые инÑталлÑции и PPA)" + diff --git a/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po b/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po index 754e9080c584ee1ea055f40fd4983dd3da900c16..a28611689c61b135050804a53d7b039c7eb985fa 100644 --- a/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po +++ b/i2p2www/translations/ru_RU/LC_MESSAGES/priority.po @@ -12,7 +12,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-23 12:26+0000\n" "Last-Translator: denixx <denixx.baykin@gmail.com>\n" "Language-Team: Russian (Russia) " @@ -3399,22 +3399,26 @@ msgstr "" "<a href=\"%(media)s\">Ñ Ð¿Ñ€ÐµÐ·ÐµÐ½Ñ‚Ð°Ñ†Ð¸Ñми, видео и учебниками о I2P</a>." #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "Ð”Ñ€ÑƒÐ·ÑŒÑ Ð¿Ñ€Ð¾ÐµÐºÑ‚Ð° I2P" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "Другие Проекты и документациÑ" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "ПреÑÑа" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "ДоÑки, новоÑтные Ñайты, другое" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "Очень Ñтарое добро" diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po b/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po index b99d2cf5a73a505ba614ad08443eeb7d43998ea1..abe35bc00cc898834df4455969634018d770ce73 100644 --- a/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po +++ b/i2p2www/translations/sv_SE/LC_MESSAGES/blog.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-11 23:00+0000\n" "Last-Translator: hottuna <i2p@robertfoss.se>\n" "Language-Team: Swedish (Sweden) " @@ -63,6 +63,7 @@ msgstr "`nerladdningssidan`" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:79 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:45 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:13 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:101 msgid "RELEASE DETAILS" msgstr "RELEASE DETALJER" @@ -74,6 +75,7 @@ msgstr "RELEASE DETALJER" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:24 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:24 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:34 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:103 msgid "Major Changes" msgstr "Stora Förändringar" @@ -89,6 +91,7 @@ msgstr "Stora Förändringar" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:39 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:81 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:54 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:112 msgid "Bug Fixes" msgstr "Buggfixar" @@ -106,6 +109,7 @@ msgstr "Buggfixar" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:94 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:63 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:19 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:118 msgid "Other" msgstr "Andra" @@ -123,6 +127,7 @@ msgstr "Andra" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:110 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:79 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:30 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:129 msgid "SHA256 Checksums:" msgstr "SHA256 Kontrollsummor:" @@ -277,6 +282,7 @@ msgstr "Uppdatera wrapper till 3.5.15 (enbart nya installationer or PPA)" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:108 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:77 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:127 msgid "Update GeoIP data (new installs and PPA only)" msgstr "Uppdatera GeoIP data (enbart nya installationer och PPA)" @@ -936,6 +942,7 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:47 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:15 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:107 msgid "Anonymity Improvements" msgstr "" @@ -1090,3 +1097,208 @@ msgstr "" msgid "UPnP fix for some hardware" msgstr "" +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:2 +#, fuzzy +msgid "0.9.8 Release" +msgstr "0.9.4 Release" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7 +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9 +msgid "" +"0.9.8 includes the long-awaited support for IPv6. It's enabled by " +"default, but of course you need a public IPv6 address to use it. " +"Configuration is on the 'network' configuration tab in your console. We " +"also have anonymity improvements including padding of SSU packets and " +"longer router private keys." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11 +#, python-format +msgid "30% of you will update via in-network torrent in this update cycle." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13 +msgid "IPv6 Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15 +msgid "" +"IPv6 is enabled and preferred by default. If you have a public IPv6 " +"address \n" +"and you are connecting to another router with a published IPv6 address, " +"it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet" +" in \n" +"the router console. If IPv6 is causing problems you may disable it there." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22 +msgid "" +"As a part of the IPv6 development effort, I2P now supports multiple \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, " +"IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The" +" \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you " +"have \n" +"multiple addresses you should review the configuration on /confignet and " +"adjust \n" +"it if necessary.\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on " +"/confignet,\n" +"we recommend that you use only one IPv4 and one IPv6 address. There are\n" +"bugs still to be fixed with multiple addresses of each type." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34 +msgid "" +"While IPv6 support was designed and developed over several years, it has" +" \n" +"only been tested by a limited number of users and is still beta. If you " +"do have \n" +"a public IPv6 address, please monitor your router and the logs for " +"problems, \n" +"and disable it necessary. Please report any bugs on \n" +"http://trac.i2p2.i2p." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:42 +msgid "Rekeying Details" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44 +msgid "" +"For those of you running I2P on faster hardware (generally, 64-bit x86) " +"the \n" +"router will generate a new identity using longer keys. This will " +"substantially \n" +"reduce your participating traffic for 48 hours or more, while your router" +" \n" +"re-integrates into the network. Due to the new keys, the large number of" +" \n" +"torrent updates, and the recent network growth, we expect substantial \n" +"disruption to the network for a week or more after the update is " +"released. \n" +"Please be patient and things should start to improve after a few days." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54 +msgid "" +"These changes may result in higher CPU usage for some of you. We're doing" +" \n" +"our best to increase efficiency, but stronger security generally requires" +" more \n" +"computation. Performance may also be poor during the first week\n" +"due to the network churn.\n" +"We will evaluate the network performace before deciding whether to\n" +"change the key length on slower hardware in a future release." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63 +msgid "" +"We are experiencing rapid network growth in the last few weeks, which is" +" \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, " +"the \n" +"network is still performing fairly well, so keep spreading the word." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:69 +#, fuzzy +msgid "More Changes Coming" +msgstr "Stora förändringar" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:71 +msgid "" +"We're in the initial stages of desiging major changes to strengthen our \n" +"crypto. Stronger crypto will use more CPU and it may possibly \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P " +"on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but " +"some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no " +"longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " +"in \n" +"minimum requirements will be announced well in advance." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:81 +msgid "New Website" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:83 +msgid "" +"After a heroic effort by str4d, the new website preview is available at \n" +"http://i2hq.srv.i2p2.de. We hope to see it go live at \n" +"https://geti2p.net and http://www.i2p2.i2p soon. Please \n" +"contribute to the new website translations on Transifex, especially the \n" +"website_priority resource." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91 +msgid "Community Participation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:93 +msgid "" +"In early August, hottuna and zzz attended DEFCON 21 in Las Vegas.\n" +"Last weekend, echelon attended the CTS IV conference in Berlin and\n" +"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" +"Several of us will be at 30C3 in Hamburg late this year.\n" +"It's great to see people participating at these events and representing " +"I2P." +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105 +msgid "IPv6 support for both NTCP and SSU" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:109 +msgid "SSU protocol obfuscation by adding random padding" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:110 +msgid "Longer encryption and DH private keys for users on faster platforms" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:114 +msgid "Fix I2PTunnel / I2CP locking and duplicates (partial)" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:115 +msgid "Fix translation of HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:116 +msgid "Fix occasional runtime exception in NTCP" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120 +msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 +msgid "Streaming: Improved recovery from lost acks, other fixes" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 +msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 +#, fuzzy +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, " +"Swedish, Turkish" +msgstr "Översättningsuppdateringar: Italienska, Portugisiska, Spanska, Svenska" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 +msgid "New Romanian translation" +msgstr "" + +#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:126 +#, fuzzy +msgid "Wrapper 3.5.20 (new installs and PPA only)" +msgstr "Uppdatera wrapper till 3.5.15 (enbart nya installationer or PPA)" + diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po b/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po index 1c5c6327d95e1e1d482c66fb7c32b4bfaed026bf..031f46970a25a5ed4bf39445b9b65b723eb6a39b 100644 --- a/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po +++ b/i2p2www/translations/sv_SE/LC_MESSAGES/docs.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-08-30 23:32+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-04-27 23:10+0000\n" "Last-Translator: Martin Svensson <digitalmannen@gmail.com>\n" "Language-Team: Swedish (Sweden) " @@ -9999,11 +9999,57 @@ msgstr "" msgid "November 2010" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:6 -msgid "What do we mean by \"anonymous\"?" +#: i2p2www/pages/site/docs/how/threat-model.html:7 +msgid "low" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:8 +msgid "medium" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:9 +msgid "high" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:34 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "Damage Potential" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:35 +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "Reliability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:36 +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "Exploitability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:37 +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "Affected Users" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:38 +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "Discoverability" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:39 +msgid "Severity" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:40 +#: i2p2www/pages/site/docs/protocol/i2np.html:94 +msgid "Priority" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:45 +msgid "What do we mean by \"anonymous\"?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:47 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" "to find out information you don't want them to know?\" - who you are, " @@ -10021,7 +10067,7 @@ msgid "" "data, to those fearful of discovery by powerful organizations or states." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:19 +#: i2p2www/pages/site/docs/how/threat-model.html:58 msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" @@ -10030,7 +10076,7 @@ msgid "" "so that you may decide whether it meets your needs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:26 +#: i2p2www/pages/site/docs/how/threat-model.html:65 msgid "" "We welcome further research and analysis on I2P's resistance to the " "threats described below.\n" @@ -10039,11 +10085,11 @@ msgid "" "work focused on I2P is needed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:32 +#: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "Network Topology Summary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:33 +#: i2p2www/pages/site/docs/how/threat-model.html:72 #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" @@ -10052,7 +10098,7 @@ msgid "" "reviewing related literature:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:39 +#: i2p2www/pages/site/docs/how/threat-model.html:78 msgid "" "<b>I2P is a free route mixnet</b> - the message creator explicitly " "defines the\n" @@ -10063,7 +10109,7 @@ msgid "" "inbound tunnel)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:45 +#: i2p2www/pages/site/docs/how/threat-model.html:84 msgid "" "<b>I2P has no official entry and exit points</b> - all peers fully " "participate in the \n" @@ -10071,7 +10117,7 @@ msgid "" "application layer, a few proxies do exist)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:50 +#: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" "<b>I2P is fully distributed</b> - there are no central controls or " "authorities.\n" @@ -10086,7 +10132,7 @@ msgid "" "anonymity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:60 +#: i2p2www/pages/site/docs/how/threat-model.html:99 #, python-format msgid "" "We have documented plans to implement <a " @@ -10105,7 +10151,7 @@ msgid "" "delay features." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:71 +#: i2p2www/pages/site/docs/how/threat-model.html:110 msgid "" "In theory, routers along the message path may inject an \n" "arbitrary number of hops before forwarding the message to the next peer, " @@ -10113,11 +10159,11 @@ msgid "" "the current implementation does not." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:78 -msgid "The Threat Model (Attacks)" +#: i2p2www/pages/site/docs/how/threat-model.html:117 +msgid "The Threat Model" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:79 +#: i2p2www/pages/site/docs/how/threat-model.html:118 msgid "" "I2P design started in 2003, not long after the advent of\n" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" @@ -10129,7 +10175,7 @@ msgid "" "from the significant academic interest in Tor." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:89 +#: i2p2www/pages/site/docs/how/threat-model.html:128 msgid "" "Taking from the attacks and analysis put forth in the \n" "<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " @@ -10142,14 +10188,14 @@ msgid "" "this list to include new attacks as they are identified." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:98 +#: i2p2www/pages/site/docs/how/threat-model.html:137 msgid "" "Included are some attacks that may be unique to I2P.\n" "We do not have good answers for all these attacks, however\n" "we continue to do research and improve our defenses." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:104 +#: i2p2www/pages/site/docs/how/threat-model.html:143 msgid "" "In addition, many of these attacks are significantly easier than\n" "they should be, due to the modest size of the current network.\n" @@ -10160,7 +10206,7 @@ msgid "" "these attacks will become much harder." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:114 +#: i2p2www/pages/site/docs/how/threat-model.html:153 #, python-format msgid "" "The\n" @@ -10170,98 +10216,133 @@ msgid "" "to review." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:121 -msgid "Index" +#: i2p2www/pages/site/docs/how/threat-model.html:160 +#, python-format +msgid "" +"Attacks are judged using the <a href=\"%(DREAD)s\">modified " +"<strong>DREAD</strong> model</a>:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:123 -#: i2p2www/pages/site/docs/how/threat-model.html:143 +#: i2p2www/pages/site/docs/how/threat-model.html:165 +msgid "If a threat exploit occurs, how much damage will be caused?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:166 +msgid "How reliable is the attack?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:167 +msgid "What is needed to exploit this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:168 +msgid "How many users will be affected?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:169 +msgid "How easy is it to discover this threat?" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:172 +#, python-format +msgid "" +"Each category is given a rating of low, medium or high. The severity\n" +"and priority scores are calculated using the equations outlined\n" +"<a href=\"%(DREAD)s\">here</a>." +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:178 +msgid "Index of Attacks" +msgstr "" + +#: i2p2www/pages/site/docs/how/threat-model.html:180 +#: i2p2www/pages/site/docs/how/threat-model.html:200 msgid "Brute force attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:124 -#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:181 +#: i2p2www/pages/site/docs/how/threat-model.html:244 msgid "Timing attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:125 -#: i2p2www/pages/site/docs/how/threat-model.html:220 +#: i2p2www/pages/site/docs/how/threat-model.html:182 +#: i2p2www/pages/site/docs/how/threat-model.html:281 msgid "Intersection attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:126 -#: i2p2www/pages/site/docs/how/threat-model.html:298 +#: i2p2www/pages/site/docs/how/threat-model.html:183 +#: i2p2www/pages/site/docs/how/threat-model.html:361 msgid "Denial of service attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:127 -#: i2p2www/pages/site/docs/how/threat-model.html:385 +#: i2p2www/pages/site/docs/how/threat-model.html:184 +#: i2p2www/pages/site/docs/how/threat-model.html:460 msgid "Tagging attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:128 -#: i2p2www/pages/site/docs/how/threat-model.html:400 +#: i2p2www/pages/site/docs/how/threat-model.html:185 +#: i2p2www/pages/site/docs/how/threat-model.html:478 msgid "Partitioning attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:129 -#: i2p2www/pages/site/docs/how/threat-model.html:438 +#: i2p2www/pages/site/docs/how/threat-model.html:186 +#: i2p2www/pages/site/docs/how/threat-model.html:518 msgid "Predecessor attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:130 -#: i2p2www/pages/site/docs/how/threat-model.html:481 +#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:563 msgid "Harvesting attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:131 -#: i2p2www/pages/site/docs/how/threat-model.html:525 +#: i2p2www/pages/site/docs/how/threat-model.html:188 +#: i2p2www/pages/site/docs/how/threat-model.html:610 msgid "Identification Through Traffic Analysis" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:132 -#: i2p2www/pages/site/docs/how/threat-model.html:582 +#: i2p2www/pages/site/docs/how/threat-model.html:189 +#: i2p2www/pages/site/docs/how/threat-model.html:670 msgid "Sybil attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:133 -#: i2p2www/pages/site/docs/how/threat-model.html:629 +#: i2p2www/pages/site/docs/how/threat-model.html:190 +#: i2p2www/pages/site/docs/how/threat-model.html:719 msgid "Buddy Exhaustion attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:134 -#: i2p2www/pages/site/docs/how/threat-model.html:651 +#: i2p2www/pages/site/docs/how/threat-model.html:191 +#: i2p2www/pages/site/docs/how/threat-model.html:744 msgid "Cryptographic attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:135 +#: i2p2www/pages/site/docs/how/threat-model.html:192 msgid "Floodfill attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:136 -#: i2p2www/pages/site/docs/how/threat-model.html:707 +#: i2p2www/pages/site/docs/how/threat-model.html:193 +#: i2p2www/pages/site/docs/how/threat-model.html:805 msgid "Other Network Database attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:137 +#: i2p2www/pages/site/docs/how/threat-model.html:194 msgid "Attacks on centralized resources" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:138 -#: i2p2www/pages/site/docs/how/threat-model.html:770 +#: i2p2www/pages/site/docs/how/threat-model.html:195 +#: i2p2www/pages/site/docs/how/threat-model.html:871 msgid "Development attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:139 +#: i2p2www/pages/site/docs/how/threat-model.html:196 msgid "Implementation attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:140 -#: i2p2www/pages/site/docs/how/threat-model.html:849 +#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:955 msgid "Other Defenses" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:145 +#: i2p2www/pages/site/docs/how/threat-model.html:204 msgid "" "A brute force attack can be mounted by a global passive or active " "adversary, \n" @@ -10282,7 +10363,7 @@ msgid "" "message)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:157 +#: i2p2www/pages/site/docs/how/threat-model.html:216 msgid "" "However, a powerful attacker can use brute force to detect trends - if " "they \n" @@ -10309,7 +10390,7 @@ msgid "" "not currently implemented." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:174 +#: i2p2www/pages/site/docs/how/threat-model.html:233 #, python-format msgid "" "As a partial defense against a single router or group of routers trying " @@ -10322,7 +10403,7 @@ msgid "" "<a href=\"%(peerselection)s\">peer selection page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:187 +#: i2p2www/pages/site/docs/how/threat-model.html:248 msgid "" "I2P's messages are unidirectional and do not necessarily imply that a " "reply\n" @@ -10338,7 +10419,7 @@ msgid "" "slow to have passed the message along." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:197 +#: i2p2www/pages/site/docs/how/threat-model.html:258 msgid "" "This sort of attack is powerful, but its applicability to I2P is non " "obvious,\n" @@ -10356,7 +10437,7 @@ msgid "" "DataMessage+DeliveryStatusMessage)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:207 +#: i2p2www/pages/site/docs/how/threat-model.html:268 #, python-format msgid "" "Without protocol scrubbing or higher latency, global active adversaries " @@ -10372,14 +10453,14 @@ msgid "" "but these are unimplemented in I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:216 +#: i2p2www/pages/site/docs/how/threat-model.html:277 #, python-format msgid "" "References: <a href=\"%(pdf)s\">Low-Resource Routing Attacks Against " "Anonymous Systems</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:222 +#: i2p2www/pages/site/docs/how/threat-model.html:285 msgid "" "Intersection attacks against low latency systems are extremely powerful -" "\n" @@ -10395,7 +10476,7 @@ msgid "" "scenarios." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:232 +#: i2p2www/pages/site/docs/how/threat-model.html:295 #, python-format msgid "" "In summary, if an attacker is at both ends of your tunnel at the same " @@ -10406,61 +10487,61 @@ msgid "" "Tor provides a <a href=\"%(url)s\">similar disclaimer</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:240 +#: i2p2www/pages/site/docs/how/threat-model.html:303 msgid "Partial defenses implemented in I2P:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:244 +#: i2p2www/pages/site/docs/how/threat-model.html:307 #, python-format msgid "<a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:247 +#: i2p2www/pages/site/docs/how/threat-model.html:310 #, python-format msgid "" "<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " "small group that changes slowly" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:250 +#: i2p2www/pages/site/docs/how/threat-model.html:313 msgid "Limits on the number of tunnels routed through a single peer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:253 +#: i2p2www/pages/site/docs/how/threat-model.html:316 msgid "" "Prevention of peers from the same /16 IP range from being members of a " "single tunnel" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:256 +#: i2p2www/pages/site/docs/how/threat-model.html:319 msgid "" "For eepsites or other hosted services, we support\n" "simultaneous hosting on multiple routers, or\n" "<a href=\"#intersection\">multihoming</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:263 +#: i2p2www/pages/site/docs/how/threat-model.html:326 msgid "" "Even in total, these defenses are not a complete solution.\n" "Also, we have made some design choices that may significantly increase " "our vulnerability:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:268 +#: i2p2www/pages/site/docs/how/threat-model.html:331 msgid "We do not use low-bandwidth \"guard nodes\"" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:271 +#: i2p2www/pages/site/docs/how/threat-model.html:334 msgid "" "We use tunnel pools comprised of several tunnels, and traffic can shift " "from tunnel to tunnel." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:274 +#: i2p2www/pages/site/docs/how/threat-model.html:337 msgid "Tunnels are not long-lived; new tunnels are built every 10 minutes." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:277 +#: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" "Tunnel lengths are configurable.\n" "While 3-hop tunnels are recommended for full protection, several " @@ -10468,7 +10549,7 @@ msgid "" "services use 2-hop tunnels by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:284 +#: i2p2www/pages/site/docs/how/threat-model.html:347 #, python-format msgid "" "In the future, it could\n" @@ -10483,26 +10564,26 @@ msgid "" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:293 +#: i2p2www/pages/site/docs/how/threat-model.html:356 #, python-format msgid "Reference: <a href=\"%(oce)s\">One Cell Enough</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:300 +#: i2p2www/pages/site/docs/how/threat-model.html:363 msgid "" "There are a whole slew of denial of service attacks available against " "I2P,\n" "each with different costs and consequences:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:305 +#: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" "<b>Greedy user attack:</b> This is simply\n" "people trying to consume significantly more resources than they are \n" "willing to contribute. The defense against this is:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:311 +#: i2p2www/pages/site/docs/how/threat-model.html:375 #, python-format msgid "" "Set defaults so that most users provide resources to the network.\n" @@ -10511,7 +10592,7 @@ msgid "" "over 95% of I2P users relay traffic for others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:317 +#: i2p2www/pages/site/docs/how/threat-model.html:381 msgid "" "Provide easy configuration options so that users may increase their\n" "contribution (share percentage) to the network. Display easy-to-" @@ -10520,13 +10601,13 @@ msgid "" "contributing." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:322 +#: i2p2www/pages/site/docs/how/threat-model.html:386 msgid "" "Maintain a strong community with blogs, forums, IRC, and other means of " "communication." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:327 +#: i2p2www/pages/site/docs/how/threat-model.html:393 #, python-format msgid "" "<b>Starvation attack:</b> A hostile user may attempt to harm the network " @@ -10555,7 +10636,7 @@ msgid "" "significant efforts required in this area." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:344 +#: i2p2www/pages/site/docs/how/threat-model.html:413 #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" @@ -10586,7 +10667,7 @@ msgid "" "operation</a> is implemented)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:360 +#: i2p2www/pages/site/docs/how/threat-model.html:432 msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" @@ -10601,7 +10682,7 @@ msgid "" "bugs in the implementation." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:370 +#: i2p2www/pages/site/docs/how/threat-model.html:445 #, python-format msgid "" "<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " @@ -10617,7 +10698,7 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:386 +#: i2p2www/pages/site/docs/how/threat-model.html:464 #, python-format msgid "" "Tagging attacks - modifying a message so that it can later be identified" @@ -10643,7 +10724,7 @@ msgid "" "as the links are encrypted and messages signed." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:402 +#: i2p2www/pages/site/docs/how/threat-model.html:482 msgid "" "Partitioning attacks - finding ways to segregate (technically or " "analytically)\n" @@ -10672,7 +10753,7 @@ msgid "" "the moment)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:418 +#: i2p2www/pages/site/docs/how/threat-model.html:498 #, python-format msgid "" "Partitioning the network analytically by looking for differences in how " @@ -10702,14 +10783,14 @@ msgid "" "which other tunnels or messages have those delays)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:434 +#: i2p2www/pages/site/docs/how/threat-model.html:514 #, python-format msgid "" "Also discussed on the <a href=\"%(netdb)s#threat\">network database " "page</a> (bootstrap attack)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:440 +#: i2p2www/pages/site/docs/how/threat-model.html:522 msgid "" "The predecessor attack is passively gathering statistics in an attempt to" " see\n" @@ -10726,7 +10807,7 @@ msgid "" "target is located." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:450 +#: i2p2www/pages/site/docs/how/threat-model.html:532 #, python-format msgid "" "I2P avoids this in four ways: first, the peers selected to participate in" @@ -10751,7 +10832,7 @@ msgid "" "attackers will merely run into that gateway." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:467 +#: i2p2www/pages/site/docs/how/threat-model.html:549 #, python-format msgid "" "The current <a href=\"%(tunnelcreation)s\">tunnel build method</a>\n" @@ -10759,7 +10840,7 @@ msgid "" "See also <a href=\"#intersection\">the intersection attack</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:473 +#: i2p2www/pages/site/docs/how/threat-model.html:555 #, python-format msgid "" "References: <a href=\"%(pdf2008)s\">%(pdf2008)s</a>\n" @@ -10767,7 +10848,7 @@ msgid "" "<a href=\"%(pdf2004)s\">%(pdf2004)s</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:482 +#: i2p2www/pages/site/docs/how/threat-model.html:567 msgid "" "\"Harvesting\" means compiling a list of users running I2P.\n" "It can be used for legal attacks and to help\n" @@ -10775,7 +10856,7 @@ msgid "" "harvesting whatever references to other peers it can find." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:489 +#: i2p2www/pages/site/docs/how/threat-model.html:574 msgid "" "I2P itself is not designed with effective defenses against\n" "this attack, since there is the distributed network database \n" @@ -10783,17 +10864,17 @@ msgid "" "The following factors make the attack somewhat harder in practice:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:496 +#: i2p2www/pages/site/docs/how/threat-model.html:581 msgid "" "Network growth will make it more difficult to obtain a given proportion " "of the network" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:499 +#: i2p2www/pages/site/docs/how/threat-model.html:584 msgid "Floodfill routers implement query limits as DOS protection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:502 +#: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" "\"Hidden mode\", which prevents a router from publishing its information " "to the netDb,\n" @@ -10801,7 +10882,7 @@ msgid "" "could be." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:508 +#: i2p2www/pages/site/docs/how/threat-model.html:593 #, python-format msgid "" "In future implementations,\n" @@ -10815,7 +10896,7 @@ msgid "" "they can be reached (as well as their public keys, etc)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:517 +#: i2p2www/pages/site/docs/how/threat-model.html:602 msgid "" "In the future, routers could use GeoIP to identify if they are in a " "particular\n" @@ -10824,7 +10905,7 @@ msgid "" "enact other restricted route methods." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:526 +#: i2p2www/pages/site/docs/how/threat-model.html:614 #, python-format msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" @@ -10838,21 +10919,21 @@ msgid "" "make it somewhat difficult to identify I2P traffic:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:536 +#: i2p2www/pages/site/docs/how/threat-model.html:624 msgid "Random port selection" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:539 +#: i2p2www/pages/site/docs/how/threat-model.html:627 msgid "Point-to-Point Encryption of all traffic" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:542 +#: i2p2www/pages/site/docs/how/threat-model.html:630 msgid "" "DH key exchange with no protocol bytes or other unencrypted constant " "fields" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:545 +#: i2p2www/pages/site/docs/how/threat-model.html:633 #, python-format msgid "" "Simultaneous use of both\n" @@ -10862,54 +10943,54 @@ msgid "" " track." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:553 +#: i2p2www/pages/site/docs/how/threat-model.html:641 msgid "" "In the near future, we plan to directly address traffic analysis issues " "by further obfuscation of I2P transport protocols, possibly including:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:557 +#: i2p2www/pages/site/docs/how/threat-model.html:645 msgid "" "Padding at the transport layer to random lengths, especially during the " "connection handshake" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:560 +#: i2p2www/pages/site/docs/how/threat-model.html:648 msgid "" "Study of packet size distribution signatures, and additional padding as " "necessary" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:563 +#: i2p2www/pages/site/docs/how/threat-model.html:651 msgid "" "Development of additional transport methods that mimic SSL or other " "common protocols" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:566 +#: i2p2www/pages/site/docs/how/threat-model.html:654 msgid "" "Review of padding strategies at higher layers to see how they affect " "packet sizes at the transport layer" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:569 +#: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" "Review of methods implemented by various state-level firewalls to block " "Tor" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:572 +#: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "Working directly with DPI and obfuscation experts" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:577 +#: i2p2www/pages/site/docs/how/threat-model.html:665 #, python-format msgid "" "Reference: <a href=\"%(pdf)s\">Breaking and Improving Protocol " "Obfuscation</a>" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:584 +#: i2p2www/pages/site/docs/how/threat-model.html:674 msgid "" "Sybil describes a category of attacks where the adversary creates " "arbitrarily\n" @@ -10939,15 +11020,15 @@ msgid "" "scarcity)." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:602 +#: i2p2www/pages/site/docs/how/threat-model.html:692 msgid "Requiring HashCash Certificates in various places has two major problems:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:606 +#: i2p2www/pages/site/docs/how/threat-model.html:696 msgid "Maintaining backward compatibility" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:609 +#: i2p2www/pages/site/docs/how/threat-model.html:699 msgid "" "The classic HashCash problem -\n" "selecting HashCash values that are meaningful proofs of work on high-end " @@ -10955,7 +11036,7 @@ msgid "" "while still being feasible on low-end machines such as mobile devices." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:616 +#: i2p2www/pages/site/docs/how/threat-model.html:706 msgid "" "Various limitations on the number of routers in a given IP range restrict" "\n" @@ -10965,21 +11046,21 @@ msgid "" "However, this is not a meaningful defense against a powerful adversary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:623 +#: i2p2www/pages/site/docs/how/threat-model.html:713 #, python-format msgid "" "See the <a href=\"%(netdb)s#threat\">network database page</a>\n" "for more Sybil discussion." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:630 +#: i2p2www/pages/site/docs/how/threat-model.html:723 #, python-format msgid "" "(Reference: <a href=\"%(pdf)s\">In Search of an Anonymouns and Secure " "Lookup</a> Section 5.2)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:634 +#: i2p2www/pages/site/docs/how/threat-model.html:727 #, python-format msgid "" "By refusing to accept or forward tunnel build requests, except to a " @@ -11002,7 +11083,7 @@ msgid "" "Further research and defenses may be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:653 +#: i2p2www/pages/site/docs/how/threat-model.html:748 #, python-format msgid "" "We use strong cryptography with long keys, and\n" @@ -11030,7 +11111,7 @@ msgid "" "shared secret values while maintaining backward compatibility." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:672 +#: i2p2www/pages/site/docs/how/threat-model.html:767 #, python-format msgid "" "Upgrading the various data structures and protocols to support longer " @@ -11043,7 +11124,7 @@ msgid "" "implement mechanisms to make it easier for future transitions." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:681 +#: i2p2www/pages/site/docs/how/threat-model.html:776 msgid "" "In the future, several I2P protocols and data structures\n" "support securely padding messages to arbitrary sizes, so messages could " @@ -11055,11 +11136,11 @@ msgid "" "end to end messages include simple random padding." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:691 +#: i2p2www/pages/site/docs/how/threat-model.html:786 msgid "Floodfill Anonymity attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:692 +#: i2p2www/pages/site/docs/how/threat-model.html:790 #, python-format msgid "" "In addition to the floodfill DOS attacks described\n" @@ -11079,7 +11160,7 @@ msgid "" " future research." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:708 +#: i2p2www/pages/site/docs/how/threat-model.html:806 #, python-format msgid "" "A hostile user may attempt to harm the network by\n" @@ -11089,11 +11170,11 @@ msgid "" "<a href=\"%(netdb)s#threat\">network database page</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:718 +#: i2p2www/pages/site/docs/how/threat-model.html:816 msgid "Central Resource Attacks" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:719 +#: i2p2www/pages/site/docs/how/threat-model.html:820 msgid "" "There are a few centralized or limited resources (some inside I2P, some " "not)\n" @@ -11108,14 +11189,14 @@ msgid "" "not the operation of the network itself." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:729 +#: i2p2www/pages/site/docs/how/threat-model.html:830 #, python-format msgid "" "The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" " for external public access." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:732 +#: i2p2www/pages/site/docs/how/threat-model.html:833 #, python-format msgid "" "Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " @@ -11125,17 +11206,17 @@ msgid "" "reseed hosts may need improvement." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:737 +#: i2p2www/pages/site/docs/how/threat-model.html:838 msgid "" "Routers now support multiple update file locations.\n" "A malicious update host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:741 +#: i2p2www/pages/site/docs/how/threat-model.html:842 msgid "Routers now support multiple default trusted update signers." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:744 +#: i2p2www/pages/site/docs/how/threat-model.html:845 msgid "" "Routers now better handle <a href=\"#ffdos\">multiple unreliable " "floodfill peers</a>.\n" @@ -11143,21 +11224,21 @@ msgid "" "href=\"#floodfill\">more</a> study." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:748 +#: i2p2www/pages/site/docs/how/threat-model.html:849 #, python-format msgid "" "The code is now stored in a <a href=\"%(monotone)s\">distributed source " "control system</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:751 +#: i2p2www/pages/site/docs/how/threat-model.html:852 msgid "" "Routers rely on a single news host, but there is a hardcoded backup URL " "pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:755 +#: i2p2www/pages/site/docs/how/threat-model.html:856 #, python-format msgid "" "<a href=\"%(naming)s\">Naming system services</a>, including addressbook " @@ -11170,7 +11251,7 @@ msgid "" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:762 +#: i2p2www/pages/site/docs/how/threat-model.html:863 msgid "" "We remain reliant on the DNS service for i2p2.de, losing this would cause" " substantial\n" @@ -11179,7 +11260,7 @@ msgid "" "loss of i2p.net did." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:772 +#: i2p2www/pages/site/docs/how/threat-model.html:875 msgid "" "These attacks aren't directly on the network, but instead go after its " "development team \n" @@ -11195,11 +11276,11 @@ msgid "" "have a big problem." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:781 +#: i2p2www/pages/site/docs/how/threat-model.html:884 msgid "However, two techniques help defend against these attacks:" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:785 +#: i2p2www/pages/site/docs/how/threat-model.html:888 #, python-format msgid "" "All components of the network must be open source to enable inspection, " @@ -11215,7 +11296,7 @@ msgid "" "to restrict modifications to those previously approved." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:793 +#: i2p2www/pages/site/docs/how/threat-model.html:896 #, python-format msgid "" "Development over the network itself, allowing developers to stay " @@ -11229,18 +11310,18 @@ msgid "" "all available within I2P." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:804 +#: i2p2www/pages/site/docs/how/threat-model.html:907 msgid "" "We also maintain relationships with various organizations that offer " "legal advice,\n" "should any defense be necessary." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:809 +#: i2p2www/pages/site/docs/how/threat-model.html:912 msgid "Implementation attacks (bugs)" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:810 +#: i2p2www/pages/site/docs/how/threat-model.html:916 msgid "" "Try as we might, most nontrivial applications include errors in the " "design or \n" @@ -11257,7 +11338,7 @@ msgid "" "obscurity</a>." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:821 +#: i2p2www/pages/site/docs/how/threat-model.html:927 msgid "" "In addition, the code is being \n" "treated the same way, with little aversion towards reworking or throwing " @@ -11273,7 +11354,7 @@ msgid "" "enough to identify shortcomings and bugs." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:831 +#: i2p2www/pages/site/docs/how/threat-model.html:937 msgid "" "Our software is likely, in particular, to contain bugs related to denial " "of service\n" @@ -11283,7 +11364,7 @@ msgid "" "protocols." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:837 +#: i2p2www/pages/site/docs/how/threat-model.html:943 #, python-format msgid "" "I2P is still a small network with a small development community and " @@ -11295,11 +11376,11 @@ msgid "" "<a href=\"%(volunteer)s\">get involved</a> and help." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:850 +#: i2p2www/pages/site/docs/how/threat-model.html:956 msgid "Blocklists" msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:851 +#: i2p2www/pages/site/docs/how/threat-model.html:957 msgid "" "To some extent, I2P could be enhanced to avoid peers operating at IP " "addresses\n" @@ -11309,7 +11390,7 @@ msgid "" "others." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:857 +#: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" "To the extent that active peers actually do show up in the actual " "blocklist,\n" @@ -11319,7 +11400,7 @@ msgid "" "enable it by default." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:865 +#: i2p2www/pages/site/docs/how/threat-model.html:971 msgid "" "Blocklists are only a part (perhaps a small part) of an array of defenses" "\n" @@ -11330,7 +11411,7 @@ msgid "" "list above there are improvements we can make in detecting badness." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:874 +#: i2p2www/pages/site/docs/how/threat-model.html:980 msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" @@ -11340,7 +11421,7 @@ msgid "" "the i2p network down. Completely." msgstr "" -#: i2p2www/pages/site/docs/how/threat-model.html:882 +#: i2p2www/pages/site/docs/how/threat-model.html:988 msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" @@ -12570,10 +12651,6 @@ msgstr "" msgid "Type" msgstr "" -#: i2p2www/pages/site/docs/protocol/i2np.html:94 -msgid "Priority" -msgstr "" - #: i2p2www/pages/site/docs/protocol/i2np.html:95 msgid "Comments" msgstr "" diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po b/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po index b7c9671bb82e0bcf18484f3d343789f44668c8ae..df86b46904ec5088adc3a6000e42dd136773c846 100644 --- a/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/sv_SE/LC_MESSAGES/get-involved.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-04-27 23:10+0000\n" "Last-Translator: Martin Svensson <digitalmannen@gmail.com>\n" "Language-Team: Swedish (Sweden) " @@ -1154,29 +1154,29 @@ msgid "Current bounties" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Name" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Status" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Judge" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Dev" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:30 -#: i2p2www/pages/site/get-involved/bounties/index.html:99 +#: i2p2www/pages/site/get-involved/bounties/index.html:92 msgid "Bounty" msgstr "" @@ -1188,9 +1188,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:40 #: i2p2www/pages/site/get-involved/bounties/index.html:47 #: i2p2www/pages/site/get-involved/bounties/index.html:54 -#: i2p2www/pages/site/get-involved/bounties/index.html:61 +#: i2p2www/pages/site/get-involved/bounties/index.html:75 #: i2p2www/pages/site/get-involved/bounties/index.html:82 -#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Proposal in development" msgstr "" @@ -1198,9 +1197,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:42 #: i2p2www/pages/site/get-involved/bounties/index.html:49 #: i2p2www/pages/site/get-involved/bounties/index.html:56 -#: i2p2www/pages/site/get-involved/bounties/index.html:63 -#: i2p2www/pages/site/get-involved/bounties/index.html:84 -#: i2p2www/pages/site/get-involved/bounties/index.html:104 +#: i2p2www/pages/site/get-involved/bounties/index.html:77 +#: i2p2www/pages/site/get-involved/bounties/index.html:97 msgid "vacant" msgstr "" @@ -1213,49 +1211,49 @@ msgid "Backporting Phex code onto I2PHex" msgstr "" #: i2p2www/pages/site/get-involved/bounties/index.html:53 -msgid "Make I2P IPv6 native" -msgstr "" - -#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "I2P package in Debian and Ubuntu mirrors" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:67 +#: i2p2www/pages/site/get-involved/bounties/index.html:60 msgid "Bitcoin client for I2P" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:68 +#: i2p2www/pages/site/get-involved/bounties/index.html:61 msgid "Done, phase of verification" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:74 +#: i2p2www/pages/site/get-involved/bounties/index.html:67 msgid "Unit tests and Multi-router Simulation" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:75 +#: i2p2www/pages/site/get-involved/bounties/index.html:68 msgid "Partly done, partly in work, partly still open" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:96 +#: i2p2www/pages/site/get-involved/bounties/index.html:89 msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:101 +#: i2p2www/pages/site/get-involved/bounties/index.html:94 msgid "Bundling bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:102 +#: i2p2www/pages/site/get-involved/bounties/index.html:95 msgid "Proposed" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:109 +#: i2p2www/pages/site/get-involved/bounties/index.html:102 msgid "Claimed bounties" msgstr "" -#: i2p2www/pages/site/get-involved/bounties/index.html:112 +#: i2p2www/pages/site/get-involved/bounties/index.html:105 msgid "Dev team" msgstr "" +#: i2p2www/pages/site/get-involved/bounties/index.html:107 +msgid "Make I2P IPv6 native" +msgstr "" + #: i2p2www/pages/site/get-involved/bounties/index.html:114 msgid "Setting up a SILC server" msgstr "" @@ -1310,7 +1308,7 @@ msgid "" "IPv6 connections like it does on IPv4." msgstr "" -#: i2p2www/pages/site/get-involved/bounties/ipv6.html:15 +#: i2p2www/pages/site/get-involved/bounties/ipv6.html:17 #: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20 msgid "" "For bounties to be declared done and paid, we need the plugin AND the " diff --git a/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po b/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po index d9cd1799b9c2702e0dfd5cd5ea14fd010a8ba0fb..61a5fe5e47679f1cb9c327f883b596783482ad4f 100644 --- a/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po +++ b/i2p2www/translations/sv_SE/LC_MESSAGES/priority.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-27 13:36+0000\n" "Last-Translator: hottuna <i2p@robertfoss.se>\n" "Language-Team: Swedish (Sweden) " @@ -3378,22 +3378,26 @@ msgstr "" "I2P</a>." #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "Vänner till I2P" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "Fler Projekt och Dokumentation" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "Press" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "Anslagstavlor, nyhetssida, annat" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr "Väldigt Gamla Saker" diff --git a/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po b/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po index e5ec354885ba5397aa1a73422a80307f8f279446..7f48782b0d011f5682da287175ba7e544d3195b8 100644 --- a/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po +++ b/i2p2www/translations/zh_CN/LC_MESSAGES/priority.po @@ -9,7 +9,7 @@ msgid "" msgstr "" "Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: https://trac.i2p2.de/\n" -"POT-Creation-Date: 2013-09-16 12:59+0000\n" +"POT-Creation-Date: 2013-09-30 21:40+0000\n" "PO-Revision-Date: 2013-09-16 13:04+0000\n" "Last-Translator: str4d <str4d@i2pmail.org>\n" "Language-Team: Chinese (China) " @@ -2679,22 +2679,26 @@ msgstr "" "<a href=\"%(media)s\">有关 I2P 的演讲ã€è§†é¢‘åŠæ•™ç¨‹</a>。" #: i2p2www/pages/site/links.html:12 +msgid "I2P on the web" +msgstr "" + +#: i2p2www/pages/site/links.html:20 msgid "Friends of I2P" msgstr "I2P 之å‹" -#: i2p2www/pages/site/links.html:24 +#: i2p2www/pages/site/links.html:32 msgid "More Projects and Documentation" msgstr "更多项目和文档" -#: i2p2www/pages/site/links.html:34 +#: i2p2www/pages/site/links.html:42 msgid "Press" msgstr "æ–°é—»" -#: i2p2www/pages/site/links.html:38 +#: i2p2www/pages/site/links.html:46 msgid "Boards, newssite, others" msgstr "论å›ï¼Œæ–°é—»ç«™ï¼Œå…¶å®ƒ" -#: i2p2www/pages/site/links.html:42 +#: i2p2www/pages/site/links.html:50 msgid "Very Old Stuff" msgstr ""