diff --git a/.tx/config b/.tx/config index 4f8a1b12..41bf204a 100644 --- a/.tx/config +++ b/.tx/config @@ -1,60 +1,60 @@ [main] -host = https://www.transifex.com +host = https://www.transifex.com lang_map = ru_RU: ru, sv_SE: sv, tr_TR: tr, uk_UA: uk, zh_CN: zh -[I2P.website_about] -file_filter = i2p2www/translations//LC_MESSAGES/about.po -source_file = pots/about.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_about] +file_filter = i2p2www/translations//LC_MESSAGES/about.po +source_file = pots/about.pot +source_lang = en +type = PO minimum_perc = 3 -[I2P.website_blog] -file_filter = i2p2www/translations//LC_MESSAGES/blog.po -source_file = pots/blog.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_blog] +file_filter = i2p2www/translations//LC_MESSAGES/blog.po +source_file = pots/blog.pot +source_lang = en +type = PO minimum_perc = 2 -[I2P.website_comparison] -file_filter = i2p2www/translations//LC_MESSAGES/comparison.po -source_file = pots/comparison.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_comparison] +file_filter = i2p2www/translations//LC_MESSAGES/comparison.po +source_file = pots/comparison.pot +source_lang = en +type = PO minimum_perc = 10 -[I2P.website_docs] -file_filter = i2p2www/translations//LC_MESSAGES/docs.po -source_file = pots/docs.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_docs] +file_filter = i2p2www/translations//LC_MESSAGES/docs.po +source_file = pots/docs.pot +source_lang = en +type = PO minimum_perc = 3 -[I2P.website_get-involved] -file_filter = i2p2www/translations//LC_MESSAGES/get-involved.po -source_file = pots/get-involved.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_get-involved] +file_filter = i2p2www/translations//LC_MESSAGES/get-involved.po +source_file = pots/get-involved.pot +source_lang = en +type = PO minimum_perc = 3 -[I2P.website_misc] -file_filter = i2p2www/translations//LC_MESSAGES/misc.po -source_file = pots/misc.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_misc] +file_filter = i2p2www/translations//LC_MESSAGES/misc.po +source_file = pots/misc.pot +source_lang = en +type = PO minimum_perc = 10 -[I2P.website_priority] -file_filter = i2p2www/translations//LC_MESSAGES/priority.po -source_file = pots/priority.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_priority] +file_filter = i2p2www/translations//LC_MESSAGES/priority.po +source_file = pots/priority.pot +source_lang = en +type = PO minimum_perc = 10 -[I2P.website_research] -file_filter = i2p2www/translations//LC_MESSAGES/research.po -source_file = pots/research.pot -source_lang = en -type = PO +[o:otf:p:I2P:r:website_research] +file_filter = i2p2www/translations//LC_MESSAGES/research.po +source_file = pots/research.pot +source_lang = en +type = PO minimum_perc = 10 diff --git a/i2p2www/translations/ar/LC_MESSAGES/about.po b/i2p2www/translations/ar/LC_MESSAGES/about.po index 2b473cca..481de2ac 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/about.po +++ b/i2p2www/translations/ar/LC_MESSAGES/about.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. -# Copyright (C) 2021 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-08-21 15:32+0000\n" "PO-Revision-Date: 2013-07-15 11:59+0000\n" "Last-Translator: FULL NAME \n" -"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" +"Language-Team: Arabic (http://app.transifex.com/otf/I2P/language/ar/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -26,8 +26,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -50,8 +49,7 @@ msgstr "" #, python-format msgid "" "Go-I2P is I2P client developed using the\n" -"Go programming language. The project is in " -"early development." +"Go programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -71,18 +69,15 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:9 msgid "" "I2P: Invisible Internet Project: a project meant to\n" -" provide an anonymity layer, so user can communicate anonymously " -"using a\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" " range of applications." msgstr "" #: i2p2www/pages/site/about/glossary.html:12 msgid "" "Router: The core I2P software, which routes encrypted\n" -" packets on the I2P network. All routers by default participate in" -" the\n" -" network, which both helps the network and provides cover traffic " -"for any\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" " clients or servers connecting to the I2P network through the\n" " router." msgstr "" @@ -90,26 +85,22 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:17 msgid "" "RouterIdentity: A collection of information required to\n" -" communicate directly with a router, such as its IP address and " -"listening\n" +" communicate directly with a router, such as its IP address and listening\n" " port, public signing and encryption keys etc." msgstr "" #: i2p2www/pages/site/about/glossary.html:20 msgid "" "Tunnel: An anonymous communication pathway between a\n" -" client or server and the I2P network. Tunnels are unidirectional," -" so any\n" -" one client or server must have at least two Tunnels - one for " -"inbound\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" " traffic and one for outbound traffic." msgstr "" #: i2p2www/pages/site/about/glossary.html:24 msgid "" "Destination: The cryptographic identity of a tunnel.\n" -" These are the identities of clients and servers within the I2P " -"network,\n" +" These are the identities of clients and servers within the I2P network,\n" " and are analogous to the IP:port of a computer on the normal\n" " internet." msgstr "" @@ -117,39 +108,32 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:28 msgid "" "LeaseSet: A collection of information required to\n" -" communicate with a client or server at a particular Destination, " -"such as\n" +" communicate with a client or server at a particular Destination, such as\n" " the gateways of the inbound Tunnels for that\n" " Destination." msgstr "" #: i2p2www/pages/site/about/glossary.html:34 msgid "" -"This table lists definition of different networks and their components. " -"These\n" +"This table lists definition of different networks and their components. These\n" "terms and the definitions provided are taken from\n" -"Decentralization" -" Off The\n" +"Decentralization Off The\n" "Shelf: 7 Maxims by Simply Secure(used with permission)." msgstr "" #: i2p2www/pages/site/about/glossary.html:40 msgid "" "Decentralization: Network architecture that avoids\n" -" reliance on a single party. Encompasses peer-to-peer, blockchain," -"\n" -" federated, and distributed technologies that involve many " -"individual\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" " users." msgstr "" #: i2p2www/pages/site/about/glossary.html:44 msgid "" "Peer-to-Peer (p2p): Peers make a portion of their \n" -" resources, such as processing power, disk storage or network " -"bandwidth,\n" -" directly available to other network participants, without the " -"need for\n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" " central coordination by servers or stable hosts. Popularized by\n" " BitTorrent, Napster, and Bitcoin." msgstr "" @@ -157,32 +141,25 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:49 msgid "" "Federated: Federation allows separate deployments of a\n" -" service to communicate with each other through a common protocol," -" for\n" -" instance a mail server run by Google federates with a mail server" -" run by\n" -" Microsoft when you send an email from @gmail.com to @hotmail.com." -"\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" " Each deployment may host multiple users." msgstr "" #: i2p2www/pages/site/about/glossary.html:54 msgid "" "Blockchain: A distributed ledger that can record\n" -" transactions between multiple parties efficiently and in a " -"verifiable\n" +" transactions between multiple parties efficiently and in a verifiable\n" " and permanent way." msgstr "" #: i2p2www/pages/site/about/glossary.html:57 msgid "" "Distributed systems: Academic topic within the\n" -" discipline of Computer Science which is concerned with the design" -" of\n" -" computer systems that consist of many individual computers " -"connected\n" -" over a network. Peer-to-peer networks and blockchains are " -"examples of\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" " distributed systems architectures." msgstr "" @@ -196,8 +173,7 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:65 msgid "" "DHT: Distributed hash table, used in some projects to\n" -" connect peers to each other by storing information in the form of" -"\n" +" connect peers to each other by storing information in the form of\n" " key-value pairs in a distributed manner." msgstr "" @@ -217,16 +193,14 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:73 msgid "" "Hash: A number, usually displayed as a string of letters\n" -" and numbers. It can serve as a ‘fingerprint’ uniquely identifying" -"\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" " data." msgstr "" #: i2p2www/pages/site/about/glossary.html:76 msgid "" "UX: User experience, the overall experience of a person\n" -" using a product or a service, especially in terms of how easy it " -"is to\n" +" using a product or a service, especially in terms of how easy it is to\n" " use." msgstr "" @@ -236,14 +210,10 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -253,15 +223,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to echelon\n" +"If you have made a donation, please send an email to echelon\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -271,32 +240,28 @@ msgstr "مُقدِّمة" #: i2p2www/pages/site/about/intro.html:4 msgid "The Invisible Internet Project" -msgstr "" +msgstr "مشروع الإنترنت المخفي" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 msgid "I2P Cares About Privacy" -msgstr "" +msgstr "يهتم I2P بالخصوصية" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -305,15 +270,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -322,28 +287,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -352,36 +316,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -390,30 +353,26 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 msgid "Comparisons" -msgstr "" +msgstr "مقارنات" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"Anonymity " -"Bibliography\n" -"and GNUnet's related " -"projects\n" +"Anonymity Bibliography\n" +"and GNUnet's related projects\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -432,9 +391,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available here." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available here." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -491,8 +449,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "MP3 audio\n" "Youtube Video (I2P part at 44 minutes)" @@ -511,8 +468,7 @@ msgid "" "Using techhnology to advance liberty\n" "(Youtube Video)\n" "Eric Johnson.\n" -"Agora I/O Unconference, March 27," -" 2011.\n" +"Agora I/O Unconference, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -521,8 +477,7 @@ msgstr "" msgid "" "Common Darknet Weaknesses\n" "(Youtube Video)\n" -"Adrian Crenshaw, AIDE, July " -"11-15, 2011." +"Adrian Crenshaw, AIDE, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -535,8 +490,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video),\n" "\"Studio\" version (Youtube Video),\n" "Slides (ppt)\n" @@ -545,8 +499,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"Modern cipherspace ecosystems, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"Modern cipherspace ecosystems, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -554,8 +508,7 @@ msgstr "" msgid "" "I2P - The Anonymous Network\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -570,15 +523,13 @@ msgstr "" msgid "" "I2P - Still alive! (pdf)\n" "(video)\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "(pdf)\n" "(odp)\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -590,8 +541,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "(pdf)\n" "(odp)\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -617,8 +567,7 @@ msgstr "البرنامج التعليمي" #: i2p2www/pages/site/about/media.html:148 #, python-format msgid "" -"Felix Atari explains the basic principles of I2P" -"\n" +"Felix Atari explains the basic principles of I2P\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By Telecomix" @@ -657,16 +606,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:181 #, python-format msgid "" -"2003 Business Week article referencing " -"invisiblenet\n" +"2003 Business Week article referencing invisiblenet\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:186 #, python-format msgid "" -"Netzwelt.de article about being anonymous in the " -"Internet\n" +"Netzwelt.de article about being anonymous in the Internet\n" "(German)\n" "November 2007." msgstr "" @@ -682,12 +629,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:199 #, python-format msgid "" -"zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)\n" +"zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at postman's" -" tracker)" +"(link dead, seeded inside I2P at postman's tracker)" msgstr "" #: i2p2www/pages/site/about/media.html:205 @@ -701,35 +645,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:211 #, python-format msgid "" -"zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)\n" +"zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at postman's" -" tracker)" +"(link dead, seeded inside I2P at postman's tracker)" msgstr "" #: i2p2www/pages/site/about/media.html:217 #, python-format msgid "" -"Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)\n" +"Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:222 #, python-format msgid "" -"Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)\n" +"Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:227 #, python-format msgid "" -"Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.\n" +"Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.\n" "(archive.org)\n" "(mp3)\n" "Robert Lei, December 31, 2018" @@ -738,24 +676,21 @@ msgstr "" #: i2p2www/pages/site/about/media.html:236 #, python-format msgid "" -"Articles by I2P contributor Masayuki Hatta on " -"Medium.com\n" +"Articles by I2P contributor Masayuki Hatta on Medium.com\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:241 #, python-format msgid "" -"Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration\n" +"Enabling both .onion and .i2p routing with Proxy Auto-Configuration\n" "Daniel Aleksandersen, February 7 2019" msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"Open-Source-Adventskalender: Die Darknets Freenet " -"und I2P\n" +"Open-Source-Adventskalender: Die Darknets Freenet und I2P\n" "Stefan Mey, December 21, 2021" msgstr "" @@ -772,40 +707,30 @@ msgstr "" #: i2p2www/pages/site/about/media.html:277 #, python-format msgid "" -"A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things\n" +"A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things\n" "2019" msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:2 msgid "Strict Countries" -msgstr "" +msgstr "الدول الصارمة" #: i2p2www/pages/site/about/restrictive-countries.html:4 msgid "" -"This implementation of I2P (the Java implementation distributed on this " -"site)\n" -"includes a \"Strict Countries List\" which we use to decide how routers " -"should behave \n" -"within regions where applications like I2P may be limited by law. For " -"example, while\n" -"no countries that we know of prohibit using I2P, some have broad " -"prohibitions on\n" -"participating in routing for others. Routers that appear to be in the " -"\"Strict\"\n" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" "countries will automatically be placed into \"Hidden\" mode." msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:11 msgid "" -"The Project relies on the research provided by civil and digital rights " -"organizations in order\n" -"to make decisions that offer protections for its users. In this case the " -"ongoing research\n" -"provided by Freedom House has " -"been referenced. General\n" -"guidance is to include countries with a Civil Liberties (CL) score of 16 " -"or less or an Internet\n" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by Freedom House has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" "Freedom score of 39 or less (not free)." msgstr "" @@ -815,16 +740,11 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:19 msgid "" -"When a router is placed into hidden mode, three key things change about " -"it's behavior.\n" -"It will no longer publish a routerInfo to the NetDB, it will no longer " -"accept\n" -"participating tunnels, and it will reject direct connections to routers " -"in the same\n" -"country that it is in. These defenses make the routers more difficult to " -"enumerate\n" -"reliably, and prevent them from running afoul of restrictions on routing " -"traffic for\n" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" "others." msgstr "" @@ -846,18 +766,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,” \n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,” \n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -868,84 +785,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "The Set Up Wizard: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "The I2P Router Console: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"SusiMail: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"SusiMail: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"I2PSnark: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"I2PSnark: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"The Address Book: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"The Address Book: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"I2P Hidden Services " -"Manager This is a general-purpose \n" +"I2P Hidden Services Manager This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types” which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types” which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -956,8 +850,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"Mozilla Firefox: A web " -"browser with advanced privacy and \n" +"Mozilla Firefox: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -965,27 +858,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"Chromium: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"Chromium: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"BiglyBT: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge” regular torrents in-to I2P so" -" \n" +"BiglyBT: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge” regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"OpenSSH: OpenSSH is " -"a popular program used by systems administrators to OpenSSH: OpenSSH is a " +"popular program used by systems administrators to remotely administer a server, or to provide “Shell” " "accounts for users on the server." msgstr "" @@ -993,26 +882,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"Git/Gitlab: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"Git/Gitlab: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"Debian and Ubuntu GNU/Linux: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using apt-transport-i2p " -"and \n" -"apt-transport-" -"i2phttp. In the future, a bittorrent-based transport may also be \n" +"Debian and Ubuntu GNU/Linux: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using apt-transport-i2p and \n" +"apt-transport-i2phttp. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1023,10 +903,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"The SAM API Bridge: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"The SAM API Bridge: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1034,18 +912,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"The BOB API Bridge: This is a " -"deprecated technology, BOB \n" +"The BOB API Bridge: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"The I2CP API: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"The I2CP API: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1056,10 +931,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "Get involved!" msgstr "" @@ -1070,7 +943,7 @@ msgstr "المدير" #: i2p2www/pages/site/about/team.html:15 msgid "Project Manager" -msgstr "" +msgstr "مدير المشاريع" #: i2p2www/pages/site/about/team.html:17 msgid "point of contact of last resort" @@ -1103,7 +976,7 @@ msgstr "" #: i2p2www/pages/site/about/team.html:35 #, python-format msgid "Forum admin" -msgstr "" +msgstr "المنتدى المدير" #: i2p2www/pages/site/about/team.html:37 msgid "manage the public user forum" @@ -1191,7 +1064,7 @@ msgstr "" #: i2p2www/pages/site/about/team.html:85 msgid "Reseed admin" -msgstr "" +msgstr "مدير إعادة التوزيع" #: i2p2www/pages/site/about/team.html:87 msgid "Monitors, advises and recruits reseed hosts" @@ -1236,7 +1109,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:127 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:130 @@ -1476,7 +1350,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:329 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:333 @@ -1526,32 +1401,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "Toronto Crypto.\n" -"The venue was provided by Hacklab.to." -"\n" -"The marketing was spearheaded by @YrB1rd and Siew.\n" +"The venue was provided by Hacklab.to.\n" +"The marketing was spearheaded by @YrB1rd and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1569,8 +1437,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1609,10 +1477,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1626,15 +1492,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1643,11 +1505,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1702,8 +1561,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1721,15 +1579,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1748,14 +1602,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a Sybil attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1766,20 +1616,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1790,24 +1633,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the ElGamal/AES+SessionTag " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the ElGamal/AES+SessionTag algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1827,33 +1661,24 @@ msgstr "" msgid "" "Right now, our ElGamal/AES+SessionTag \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1866,32 +1691,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1901,27 +1718,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1938,17 +1747,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1961,8 +1767,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "streaming library page." msgstr "" @@ -1973,10 +1778,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the Performance " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the Performance page\n" "for current issues and thoughts." msgstr "" @@ -1995,30 +1798,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "modPow.\n" "Rather than try to tune this method, we'll call out to\n" "GNU MP - an insanely fast math library\n" "(with tuned assembler for many architectures). (Editor: see\n" -"NativeBigInteger for faster public key " -"cryptography)" +"NativeBigInteger for faster public key cryptography)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2032,55 +1828,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll always have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll always have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -2091,20 +1872,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2115,16 +1889,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -2134,17 +1903,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2155,20 +1921,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2182,26 +1941,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2210,18 +1959,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2229,16 +1972,11 @@ msgstr "" #, python-format msgid "" "As I've said, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2254,52 +1992,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic yes." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2314,102 +2033,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2422,8 +2100,3 @@ msgid "" "For possible future performance improvements see\n" "Future Performance Improvements." msgstr "" - - - - - diff --git a/i2p2www/translations/ar/LC_MESSAGES/docs.po b/i2p2www/translations/ar/LC_MESSAGES/docs.po index cf16270a..0306c2a9 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/docs.po +++ b/i2p2www/translations/ar/LC_MESSAGES/docs.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. +# Translations template for I2P. # Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-11-08 21:15+0000\n" "PO-Revision-Date: 2013-07-15 12:00+0000\n" "Last-Translator: FULL NAME \n" "Language-Team: Arabic (http://app.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:28 msgid "Index to Technical Documentation" @@ -31,20 +31,19 @@ msgid "" "This index is ordered from the highest to lowest layers.\n" "The higher layers are for \"clients\" or applications;\n" "the lower layers are inside the router itself.\n" -"The interface between applications and the router is the I2CP (I2P " -"Control\n" +"The interface between applications and the router is the I2CP (I2P Control\n" "Protocol) API." msgstr "" -#: i2p2www/pages/site/docs/index.html:19 i2p2www/pages/site/docs/index.html:245 +#: i2p2www/pages/site/docs/index.html:19 +#: i2p2www/pages/site/docs/index.html:245 msgid "Proposals" -msgstr "" +msgstr "الاقتراحات" #: i2p2www/pages/site/docs/index.html:22 #, python-format msgid "" -"The I2P Project is committed to maintaining accurate, current " -"documentation.\n" +"The I2P Project is committed to maintaining accurate, current documentation.\n" "If you find any inaccuracies in the documents linked below, please\n" "enter a ticket identifying the problem." msgstr "" @@ -84,7 +83,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:36 msgid "Specifications" -msgstr "" +msgstr "المواصفات" #: i2p2www/pages/site/docs/index.html:37 msgid "Protocol stack chart" @@ -101,8 +100,8 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:40 #, python-format msgid "" -"Invisible Internet Project (I2P) Project Overview" -" August 28, 2003 (pdf)" +"Invisible Internet Project (I2P) Project Overview " +"August 28, 2003 (pdf)" msgstr "" #: i2p2www/pages/site/docs/index.html:43 @@ -111,7 +110,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:46 i2p2www/pages/site/docs/naming.html:2 msgid "Naming and Address Book" -msgstr "" +msgstr "التسمية وكتاب العناوين" #: i2p2www/pages/site/docs/index.html:47 msgid "Address Book Subscription Feed Commands" @@ -131,7 +130,8 @@ msgstr "" msgid "Managed Clients" msgstr "" -#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:247 +#: i2p2www/pages/site/docs/index.html:51 +#: i2p2www/pages/site/docs/index.html:247 msgid "Embedding the router in your application" msgstr "" @@ -148,7 +148,8 @@ msgstr "" msgid "hostsdb.blockfile Format" msgstr "" -#: i2p2www/pages/site/docs/index.html:55 i2p2www/pages/site/docs/index.html:212 +#: i2p2www/pages/site/docs/index.html:55 +#: i2p2www/pages/site/docs/index.html:212 msgid "Configuration File Format" msgstr "" @@ -212,7 +213,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:99 #: i2p2www/pages/site/docs/api/datagrams.html:2 msgid "Datagrams" -msgstr "" +msgstr "مخطط البيانات" #: i2p2www/pages/site/docs/index.html:101 msgid "Datagram Javadoc" @@ -224,8 +225,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:105 msgid "" -"The lowest-level API used for clients (applications) to send and receive " -"traffic to a router.\n" +"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n" "Traditionally used only by Java applications and higher-level APIs." msgstr "" @@ -284,8 +284,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:131 msgid "" -"Distributed storage and retrieval of information about routers and " -"clients." +"Distributed storage and retrieval of information about routers and clients." msgstr "" #: i2p2www/pages/site/docs/index.html:133 @@ -347,8 +346,8 @@ msgstr "نفق" #: i2p2www/pages/site/docs/index.html:158 msgid "" -"Selecting peers, requesting tunnels through those peers, and encrypting " -"and routing messages through these tunnels." +"Selecting peers, requesting tunnels through those peers, and encrypting and " +"routing messages through these tunnels." msgstr "" #: i2p2www/pages/site/docs/index.html:160 @@ -403,12 +402,13 @@ msgid "Transport Layer" msgstr "" #: i2p2www/pages/site/docs/index.html:175 -msgid "The protocols for direct (point-to-point) router to router communication." +msgid "" +"The protocols for direct (point-to-point) router to router communication." msgstr "" #: i2p2www/pages/site/docs/index.html:177 msgid "Transport layer overview" -msgstr "" +msgstr "معاينة طبقة النقل" #: i2p2www/pages/site/docs/index.html:179 msgid "TCP-based transport overview and specification" @@ -536,7 +536,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:259 msgid "Bug tracker" -msgstr "" +msgstr "متتبع الأخطاء" #: i2p2www/pages/site/docs/index.html:261 msgid "I2P Source exported to GitHub" @@ -566,43 +566,30 @@ msgstr "" msgid "" "I2P ships with a generic naming library and a base implementation \n" "designed to work off a local name to destination mapping, as well as an\n" -"add-on application called the address book." -" \n" -"I2P also supports Base32 hostnames similar to " -"Tor's .onion addresses." +"add-on application called the address book. \n" +"I2P also supports Base32 hostnames similar to Tor's .onion addresses." msgstr "" #: i2p2www/pages/site/docs/naming.html:15 msgid "" "The address book is a web-of-trust\n" -"driven secure, distributed, and human readable naming system, sacrificing" -" only\n" -"the call for all human readable names to be globally unique by mandating " -"only\n" -"local uniqueness. While all messages in I2P are cryptographically " -"addressed\n" -"by their destination, different people can have local address book " -"entries for\n" -"\"Alice\" which refer to different destinations. People can still " -"discover new\n" -"names by importing published address books of peers specified in their " -"web of trust,\n" -"by adding in the entries provided through a third party, or (if some " -"people organize\n" -"a series of published address books using a first come first serve " -"registration\n" -"system) people can choose to treat these address books as name servers, " -"emulating\n" +"driven secure, distributed, and human readable naming system, sacrificing only\n" +"the call for all human readable names to be globally unique by mandating only\n" +"local uniqueness. While all messages in I2P are cryptographically addressed\n" +"by their destination, different people can have local address book entries for\n" +"\"Alice\" which refer to different destinations. People can still discover new\n" +"names by importing published address books of peers specified in their web of trust,\n" +"by adding in the entries provided through a third party, or (if some people organize\n" +"a series of published address books using a first come first serve registration\n" +"system) people can choose to treat these address books as name servers, emulating\n" "traditional DNS." msgstr "" #: i2p2www/pages/site/docs/naming.html:29 #, python-format msgid "" -"NOTE: For the reasoning behind the I2P naming system, common arguments " -"against it\n" -"and possible alternatives see the naming" -" discussion\n" +"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n" +"and possible alternatives see the naming discussion\n" "page." msgstr "" @@ -632,34 +619,31 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:55 msgid "" -"The HTTP proxy which asks the router for " -"lookups and points\n" +"The HTTP proxy which asks the router for lookups and points\n" "the user to remote jump services to assist with failed lookups." msgstr "" #: i2p2www/pages/site/docs/naming.html:59 msgid "" -"HTTP host-add forms which allow users to " -"add hosts to their local hosts.txt" +"HTTP host-add forms which allow users to add " +"hosts to their local hosts.txt" msgstr "" #: i2p2www/pages/site/docs/naming.html:62 msgid "" -"HTTP jump services which provide their own" -" lookups and redirection." +"HTTP jump services which provide their own " +"lookups and redirection." msgstr "" #: i2p2www/pages/site/docs/naming.html:65 msgid "" -"The address book application which merges " -"external\n" +"The address book application which merges external\n" "host lists, retrieved via HTTP, with the local list." msgstr "" #: i2p2www/pages/site/docs/naming.html:69 msgid "" -"The SusiDNS application which is a simple web " -"front-end\n" +"The SusiDNS application which is a simple web front-end\n" "for address book configuration and viewing of the local host lists." msgstr "" @@ -671,15 +655,11 @@ msgstr "" #, python-format msgid "" "All destinations in I2P are 516-byte (or longer) keys.\n" -"(To be more precise, it is a 256-byte public key plus a 128-byte signing " -"key\n" -"plus a 3-or-more byte certificate, which in Base64 representation is 516 " -"or more bytes.\n" -"Non-null Certificates " -"are in use now\n" +"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n" +"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n" +"Non-null Certificates are in use now\n" "for signature type indication.\n" -"Therefore, certificates in recently-generated destinations are more than " -"3 bytes." +"Therefore, certificates in recently-generated destinations are more than 3 bytes." msgstr "" #: i2p2www/pages/site/docs/naming.html:87 @@ -698,8 +678,7 @@ msgid "" "The hosts.txt Naming Service does a simple linear search through\n" "text files. This naming service was the default until\n" "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n" -"The hosts.txt format had become too slow after the file grew to thousands" -" of entries." +"The hosts.txt format had become too slow after the file grew to thousands of entries." msgstr "" #: i2p2www/pages/site/docs/naming.html:102 @@ -707,8 +686,7 @@ msgstr "" msgid "" "It does a linear search through three local files, in order, to\n" "look up host names and convert them to a 516-byte destination key.\n" -"Each file is in a simple configuration file" -" format, with hostname=base64, one per line.\n" +"Each file is in a simple configuration file format, with hostname=base64, one per line.\n" "The files are:" msgstr "" @@ -718,8 +696,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:116 msgid "" -"The Blockfile Naming Service stores multiple \"address books\" in a " -"single\n" +"The Blockfile Naming Service stores multiple \"address books\" in a single\n" "database file named hostsdb.blockfile.\n" "This Naming Service is the default since release 0.8.8." msgstr "" @@ -727,32 +704,22 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:122 #, python-format msgid "" -"A blockfile is simply on-disk storage of multiple sorted maps (key-value " -"pairs),\n" +"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n" "implemented as skiplists.\n" -"The blockfile format is specified on the Blockfile page.\n" -"It provides fast Destination lookup in a compact format. While the " -"blockfile overhead is substantial,\n" -"the destinations are stored in binary rather than in Base 64 as in the " -"hosts.txt format.\n" -"In addition, the blockfile provides the capability of arbitrary metadata " -"storage\n" -"(such as added date, source, and comments) for each entry to implement " -"advanced address book features.\n" -"The blockfile storage requirement is a modest increase over the hosts.txt" -" format, and the blockfile provides\n" +"The blockfile format is specified on the Blockfile page.\n" +"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n" +"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n" +"In addition, the blockfile provides the capability of arbitrary metadata storage\n" +"(such as added date, source, and comments) for each entry to implement advanced address book features.\n" +"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n" "approximately 10x reduction in lookup times." msgstr "" #: i2p2www/pages/site/docs/naming.html:134 msgid "" -"On creation, the naming service imports entries from the three files used" -" by the hosts.txt Naming Service.\n" -"The blockfile mimics the previous implementation by maintaining three " -"maps that\n" -"are searched in-order, named privatehosts.txt, userhosts.txt, and " -"hosts.txt.\n" +"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n" +"The blockfile mimics the previous implementation by maintaining three maps that\n" +"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n" "It also maintains a reverse-lookup map to implement rapid reverse lookups." msgstr "" @@ -782,31 +749,24 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:158 #, python-format msgid "" -"The naming service is specified with the configuration property " -"i2p.naming.impl=class.\n" +"The naming service is specified with the configuration property i2p.naming.impl=class.\n" "Other implementations are possible. For example,\n" -"there is an experimental facility for real-time lookups (a la DNS) over " -"the network within the router.\n" -"For more information see the alternatives on the discussion" -" page." +"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n" +"For more information see the alternatives on the discussion page." msgstr "" #: i2p2www/pages/site/docs/naming.html:165 msgid "" -"The HTTP proxy does a lookup via the router for all hostnames ending in " -"'.i2p'.\n" +"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n" "Otherwise, it forwards the request to a configured HTTP outproxy.\n" -"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-" -"Top Level Domain '.i2p'." +"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'." msgstr "" #: i2p2www/pages/site/docs/naming.html:171 #, python-format msgid "" "We have applied to reserve the .i2p TLD\n" -"following the procedures specified in RFC " -"6761." +"following the procedures specified in RFC 6761." msgstr "" #: i2p2www/pages/site/docs/naming.html:177 @@ -845,14 +805,11 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:202 msgid "" "For this reason, the only subscription configured by\n" -"default is http://i2p-projekt.i2p/hosts.txt " -"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)," -" \n" +"default is http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt), \n" "which contains a copy of the hosts.txt included\n" "in the I2P release.\n" "Users must configure additional subscriptions in their\n" -"local address book application (via subscriptions.txt or SusiDNS)." +"local address book application (via subscriptions.txt or SusiDNS)." msgstr "" #: i2p2www/pages/site/docs/naming.html:211 @@ -861,8 +818,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:218 msgid "" -"The operators of these services may have various policies for listing " -"hosts.\n" +"The operators of these services may have various policies for listing hosts.\n" "Presence on this list does not imply endorsement." msgstr "" @@ -873,12 +829,10 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:224 msgid "" -"While there are hopefully not any technical limitations within I2P on " -"host names,\n" +"While there are hopefully not any technical limitations within I2P on host names,\n" "the address book enforces several restrictions on host names\n" "imported from subscriptions.\n" -"It does this for basic typographical sanity and compatibility with " -"browsers,\n" +"It does this for basic typographical sanity and compatibility with browsers,\n" "and for security.\n" "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n" "Any hostnames violating these rules may not be propagated\n" @@ -891,13 +845,13 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:243 msgid "" -"Names are checked for conflict with existing names in the existing " -"userhosts.txt and hosts.txt\n" +"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n" "(but not privatehosts.txt) after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:248 -msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." +msgid "" +"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:252 @@ -933,8 +887,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:280 msgid "" "Certain hostnames reserved for project use are not allowed\n" -"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, " -"*.console.i2p, and others)" +"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)" msgstr "" #: i2p2www/pages/site/docs/naming.html:285 @@ -957,8 +910,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:302 msgid "" -"Any name received via subscription that passes all the checks is added " -"via the local naming service." +"Any name received via subscription that passes all the checks is added via " +"the local naming service." msgstr "" #: i2p2www/pages/site/docs/naming.html:306 @@ -975,19 +928,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:317 msgid "" -"International Domain Names (IDN) also work in i2p (using punycode 'xn--' " -"form).\n" -"To see IDN .i2p domain names rendered correctly in Firefox's location " -"bar,\n" +"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n" +"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n" "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config." msgstr "" #: i2p2www/pages/site/docs/naming.html:323 msgid "" -"As the address book application does not use privatehosts.txt at all, in " -"practice\n" -"this file is the only place where it is appropriate to place private " -"aliases or\n" +"As the address book application does not use privatehosts.txt at all, in practice\n" +"this file is the only place where it is appropriate to place private aliases or\n" "\"pet names\" for sites already in hosts.txt." msgstr "" @@ -1002,16 +951,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:338 msgid "" "Address Book will publish the merged hosts.txt to a location\n" -"(traditionally hosts.txt in the local I2P Site's home directory) to be " -"accessed by others\n" +"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n" "for their subscriptions.\n" "This step is optional and is disabled by default." msgstr "" #: i2p2www/pages/site/docs/naming.html:346 msgid "" -"The address book application, together with eepget, saves the Etag and/or" -" Last-Modified\n" +"The address book application, together with eepget, saves the Etag and/or Last-Modified\n" "information returned by the web server of the subscription.\n" "This greatly reduces the bandwidth required, as the web server will\n" "return a '304 Not Modified' on the next fetch if nothing has changed." @@ -1028,8 +975,7 @@ msgid "" "Hosts serving a static hosts.txt or an equivalent CGI application\n" "are strongly encouraged to deliver\n" "a Content-Length header, and either an Etag or Last-Modified header.\n" -"Also ensure that the server delivers a '304 Not Modified' when " -"appropriate.\n" +"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n" "This will dramatically reduce the network bandwidth, and\n" "reduce chances of corruption." msgstr "" @@ -1040,8 +986,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:368 msgid "" -"A host add service is a simple CGI application that takes a hostname and " -"a Base64 key as parameters\n" +"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n" "and adds that to its local hosts.txt.\n" "If other routers subscribe to that hosts.txt, the new hostname/key\n" "will be propagated through the network." @@ -1049,10 +994,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:375 msgid "" -"It is recommended that host add services impose, at a minimum, the " -"restrictions imposed by the address book application listed above.\n" -"Host add services may impose additional restrictions on hostnames and " -"keys, for example:" +"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n" +"Host add services may impose additional restrictions on hostnames and keys, for example:" msgstr "" #: i2p2www/pages/site/docs/naming.html:380 @@ -1105,10 +1048,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:426 msgid "" -"A jump service is a simple CGI application that takes a hostname as a " -"parameter\n" -"and returns a 301 redirect to the proper URL with a " -"?i2paddresshelper=key\n" +"A jump service is a simple CGI application that takes a hostname as a parameter\n" +"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key\n" "string appended.\n" "The HTTP proxy will interpret the appended string and\n" "use that key as the actual destination.\n" @@ -1131,16 +1072,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:448 msgid "" -"SusiDNS is simply a web interface front-end to configuring address book " -"subscriptions\n" +"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n" "and accessing the four address book files.\n" "All the real work is done by the 'address book' application." msgstr "" #: i2p2www/pages/site/docs/naming.html:454 msgid "" -"Currently, there is little enforcement of address book naming rules " -"within SusiDNS,\n" +"Currently, there is little enforcement of address book naming rules within SusiDNS,\n" "so a user may enter hostnames locally that would be rejected by\n" "the address book subscription rules." msgstr "" @@ -1154,36 +1093,29 @@ msgid "" "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n" "Base32 addresses are much shorter and easier to handle than the\n" "full 516-character Base64 Destinations or addresshelpers.\n" -"Example: " -"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p" +"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p" msgstr "" #: i2p2www/pages/site/docs/naming.html:468 #, python-format msgid "" -"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 " -"hash.\n" +"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n" "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n" "The form is {52 chars}.b32.i2p.\n" "Tor has a\n" -"proposal\n" -"to convert to an identical format of {52 chars}.onion for their hidden " -"services.\n" +"proposal\n" +"to convert to an identical format of {52 chars}.onion for their hidden services.\n" "Base32 is implemented in the naming service, which queries the\n" "router over I2CP to lookup the LeaseSet to get the full Destination.\n" -"Base32 lookups will only be successful when the Destination is up and " -"publishing\n" +"Base32 lookups will only be successful when the Destination is up and publishing\n" "a LeaseSet.\n" -"Because resolution may require a network database lookup, it may take " -"significantly\n" +"Because resolution may require a network database lookup, it may take significantly\n" "longer than a local address book lookup." msgstr "" #: i2p2www/pages/site/docs/naming.html:483 msgid "" -"Base32 addresses can be used in most places where hostnames or full " -"destinations\n" +"Base32 addresses can be used in most places where hostnames or full destinations\n" "are used, however there are some exceptions where they may fail if the\n" "name does not immediately resolve. I2PTunnel will fail, for example, if\n" "the name does not resolve to a destination." @@ -1209,8 +1141,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:12 msgid "" -"There are now plugins available that support distributed email, blogs, " -"IRC\n" +"There are now plugins available that support distributed email, blogs, IRC\n" "clients, distributed file storage, wikis, and more." msgstr "" @@ -1221,9 +1152,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:18 msgid "" "I2P Plugins can be installed by copying the plugin download URL onto\n" -"the appropriate section on the Router Console Plugin " -"Configuration Page." +"the appropriate section on the Router Console Plugin Configuration Page." msgstr "" #: i2p2www/pages/site/docs/plugins.html:23 @@ -1232,8 +1161,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:28 msgid "" -"Then visit the plugin configuration page, which you can find linked on " -"the console homepage." +"Then visit the plugin configuration page, which you can find linked on the " +"console homepage." msgstr "" #: i2p2www/pages/site/docs/plugins.html:33 @@ -1256,8 +1185,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:50 msgid "" -"Support large or special-purpose applications that would never be bundled" -"\n" +"Support large or special-purpose applications that would never be bundled\n" "with the I2P installation" msgstr "" @@ -1271,8 +1199,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:63 msgid "" -"Separate initial install and update packages, if desired, for smaller " -"update downloads" +"Separate initial install and update packages, if desired, for smaller update" +" downloads" msgstr "" #: i2p2www/pages/site/docs/plugins.html:67 @@ -1302,7 +1230,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/plugins.html:89 -msgid "Automatic integration and startup of webapps into console Jetty instance" +msgid "" +"Automatic integration and startup of webapps into console Jetty instance" msgstr "" #: i2p2www/pages/site/docs/plugins.html:93 @@ -1342,17 +1271,11 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:121 msgid "" -"To update a plugin to the latest version, just click the update button on" -"\n" -"configclients.jsp." -"\n" -"There is also a button to check if the plugin has a more recent version, " -"as\n" -"well as a button to check for updates for all plugins. Plugins will be " -"checked\n" -"for updates automatically when updating to a new I2P release (not " -"including dev\n" +"To update a plugin to the latest version, just click the update button on\n" +"configclients.jsp.\n" +"There is also a button to check if the plugin has a more recent version, as\n" +"well as a button to check for updates for all plugins. Plugins will be checked\n" +"for updates automatically when updating to a new I2P release (not including dev\n" "builds)." msgstr "" @@ -1363,25 +1286,21 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:133 #, python-format msgid "" -"See the latest plugin specification and " -"the\n" +"See the latest plugin specification and the\n" "plugin forum on %(zzz)s." msgstr "" #: i2p2www/pages/site/docs/plugins.html:138 #, python-format msgid "" -"See also the sources for plugins developed by various people. Some " -"plugins, such\n" -"as snowman, were " -"developed\n" +"See also the sources for plugins developed by various people. Some plugins, such\n" +"as snowman, were developed\n" "specifically as examples." msgstr "" #: i2p2www/pages/site/docs/plugins.html:144 msgid "" -"Developers wanted! Plugins are a great way to learn more about I2P" -"\n" +"Developers wanted! Plugins are a great way to learn more about I2P\n" "or easily add some feature." msgstr "" @@ -1393,8 +1312,7 @@ msgstr "ابدء" #, python-format msgid "" "To create a plugin from an existing binary package you will need to get\n" -"makeplugin.sh from the i2p.scripts branch in " -"monotone." +"makeplugin.sh from the i2p.scripts branch in monotone." msgstr "" #: i2p2www/pages/site/docs/plugins.html:156 @@ -1410,8 +1328,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:163 msgid "" "Updates of a plugin with included jars (not wars) won't be recognized if\n" -"the plugin was already run, as it requires class loader trickery to flush" -" the\n" +"the plugin was already run, as it requires class loader trickery to flush the\n" "class cache; a full router restart is required." msgstr "" @@ -1421,32 +1338,27 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:173 msgid "" -"Plugins running in a separate JVM create a logs/ directory " -"in\n" +"Plugins running in a separate JVM create a logs/ directory in\n" "$CWD." msgstr "" #: i2p2www/pages/site/docs/plugins.html:178 msgid "" -"No initial keys are present, except for those of jrandom and zzz (using " -"the\n" +"No initial keys are present, except for those of jrandom and zzz (using the\n" "same keys as for router update), so the first key seen for a signer is\n" "automatically accepted—there is no signing key authority." msgstr "" #: i2p2www/pages/site/docs/plugins.html:184 msgid "" -"When deleting a plugin, the directory is not always deleted, especially " -"on\n" +"When deleting a plugin, the directory is not always deleted, especially on\n" "Windows." msgstr "" #: i2p2www/pages/site/docs/plugins.html:189 msgid "" -"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result " -"in a\n" -"\"plugin is corrupt\" message if pack200 compression of the plugin file " -"is used." +"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n" +"\"plugin is corrupt\" message if pack200 compression of the plugin file is used." msgstr "" #: i2p2www/pages/site/docs/plugins.html:194 @@ -1463,8 +1375,7 @@ msgstr "" #: i2p2www/pages/site/docs/ports.html:7 msgid "" -"These are the ports used or reserved by I2P, including those for known " -"plugins,\n" +"These are the ports used or reserved by I2P, including those for known plugins,\n" "common alternates,\n" "and some typical related applications." msgstr "" @@ -1498,20 +1409,16 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:10 msgid "" -"Reseed hosts are needed to for bootstrapping, that is, providing the " -"initial set\n" -"of I2P nodes for your I2P node to talk to. Depending on the status of " -"your node\n" -"it may need to bootstrap every now and then if many of the nodes it knows" -" of\n" +"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n" +"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n" +"it may need to bootstrap every now and then if many of the nodes it knows of\n" "aren't contactable." msgstr "" #: i2p2www/pages/site/docs/reseed.html:17 msgid "" "Reseeding is done over an encrypted connection and all of the bootstrap\n" -"information is signed by the reseed host you connect to, making it " -"impossible\n" +"information is signed by the reseed host you connect to, making it impossible\n" "for an unauthenticated source to provide you with false information." msgstr "" @@ -1522,12 +1429,9 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:26 msgid "" "Operating a reseed server can be accessible to any sysadmin familiar\n" -"with I2P, and we encourage new reseed operators to get in contact with us" -" at\n" -"the development forums. The more reseed " -"hosts that\n" -"are run, the more resilient the I2P network becomes, and the harder it is" -" to\n" +"with I2P, and we encourage new reseed operators to get in contact with us at\n" +"the development forums. The more reseed hosts that\n" +"are run, the more resilient the I2P network becomes, and the harder it is to\n" "prevent users of I2P from connecting to the network." msgstr "" @@ -1537,15 +1441,11 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:42 msgid "" -"In order to make I2P more reslient, other kinds of reseeding are " -"possible. One\n" -"important way of carrying out a reseed is the file-based reseed, where a " -"user\n" -"with a running I2P router generates a reseed file for a friend and " -"transfers it\n" +"In order to make I2P more reslient, other kinds of reseeding are possible. One\n" +"important way of carrying out a reseed is the file-based reseed, where a user\n" +"with a running I2P router generates a reseed file for a friend and transfers it\n" "to them as a .zip file. Others use cloud-based infrastructure to resist\n" -"censorship. These reseed methods provide functionality which aids people " -"in\n" +"censorship. These reseed methods provide functionality which aids people in\n" "situations where reseeds are restricted." msgstr "" @@ -1555,8 +1455,7 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:60 msgid "" -"If you are running a reseed server, We would like to thank you for " -"helping to\n" +"If you are running a reseed server, We would like to thank you for helping to\n" "make the I2P network stronger and more resilient than ever." msgstr "" @@ -1579,27 +1478,25 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:42 msgid "" "ERROR as is implied returns the message \"ERROR " -"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION is what" -" went wrong." +"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION is what " +"went wrong." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:45 msgid "" -"OK returns \"OK\", and if data is to be " -"returned, it is on the same line. OK means the command is " -"finished." +"OK returns \"OK\", and if data is to be returned, " +"it is on the same line. OK means the command is finished." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:48 msgid "" -"DATA lines contain information that you requested. There may" -" be multiple DATA lines per request." +"DATA lines contain information that you requested. There may be" +" multiple DATA lines per request." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:52 msgid "" -"NOTE: The help command is the ONLY command that has an exception " -"to\n" +"NOTE: The help command is the ONLY command that has an exception to\n" "the rules... it can actually return nothing! This is intentional, since\n" "help is a HUMAN and not an APPLICATION command." msgstr "" @@ -1610,8 +1507,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:60 msgid "" -"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated," -" depending on the system.\n" +"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n" "On connection, BOB outputs two lines:" msgstr "" @@ -1621,8 +1517,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:74 msgid "" -"Note that previous versions used upper-case hex digits and did not " -"conform to I2P versioning standards.\n" +"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n" "It is recommended that subsequent versions use digits 0-9 only." msgstr "" @@ -1658,16 +1553,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:98 msgid "" "PLEASE NOTE:\n" -"For CURRENT details on the commands PLEASE use the built-in help command." -"\n" -"Just telnet to localhost 2827 and type help and you can get full " -"documentation on each command." +"For CURRENT details on the commands PLEASE use the built-in help command.\n" +"Just telnet to localhost 2827 and type help and you can get full documentation on each command." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:104 msgid "" -"Commands never get obsoleted or changed, however new commands do get " -"added from time to time." +"Commands never get obsoleted or changed, however new commands do get added " +"from time to time." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:109 @@ -1684,36 +1577,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:137 msgid "" -"Once set up, all TCP sockets can and will block as needed, and there is " -"no need for any\n" -"additional messages to/from the command channel. This allows the router " -"to pace the\n" -"stream without exploding with OOM like SAM does as it chokes on " -"attempting to shove\n" -"many streams in or out one socket -- that can't scale when you have alot " -"of connections!" +"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n" +"additional messages to/from the command channel. This allows the router to pace the\n" +"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n" +"many streams in or out one socket -- that can't scale when you have alot of connections!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:144 msgid "" -"What is also nice about this particular interface is that writing " -"anything to interface\n" -"to it, is much much easier than SAM. There is no other processing to do " -"after the set up.\n" -"It's configuration is so simple, that very simple tools, such as nc " -"(netcat) can be used\n" -"to point to some application. The value there is that one could schedule " -"up and down times\n" -"for an application, and not have to change the application to do that, or" -" to even have\n" -"to stop that application. Instead, you can literally \"unplug\" the " -"destination, and\n" -"\"plug it in\" again. As long as the same IP/port addresses and " -"destination keys are used\n" -"when bringing the bridge up, the normal TCP application won't care, and " -"won't notice.\n" -"It will simply be fooled -- the destinations are not reachable, and that " -"nothing is coming in." +"What is also nice about this particular interface is that writing anything to interface\n" +"to it, is much much easier than SAM. There is no other processing to do after the set up.\n" +"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n" +"to point to some application. The value there is that one could schedule up and down times\n" +"for an application, and not have to change the application to do that, or to even have\n" +"to stop that application. Instead, you can literally \"unplug\" the destination, and\n" +"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n" +"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n" +"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:156 @@ -1722,12 +1602,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:158 msgid "" -"For the following example, we'll setup a very simple local loopback " -"connection,\n" -"with two destinations. Destination \"mouth\" will be the CHARGEN service " -"from\n" -"the INET superserver daemon. Destination \"ear\" will be a local port " -"that you\n" +"For the following example, we'll setup a very simple local loopback connection,\n" +"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n" +"the INET superserver daemon. Destination \"ear\" will be a local port that you\n" "can telnet into, and watch the pretty ASCII test puke forth." msgstr "" @@ -1776,30 +1653,28 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:193 msgid "" -"At this point, there was no error, a destination with a nickname of " -"\"mouth\"\n" -"is set up. When you contact the destination provided, you actually " -"connect\n" +"At this point, there was no error, a destination with a nickname of \"mouth\"\n" +"is set up. When you contact the destination provided, you actually connect\n" "to the CHARGEN service on 19/TCP." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:199 -msgid "Now for the other half, so that we can actually contact this destination." +msgid "" +"Now for the other half, so that we can actually contact this destination." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:221 msgid "" "Now all we need to do is telnet into 127.0.0.1, port 37337,\n" -"send the destination key or host address from address book we want to " -"contact.\n" +"send the destination key or host address from address book we want to contact.\n" "In this case, we want to contact \"mouth\", all we do is paste in the\n" "key and it goes." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:228 msgid "" -"NOTE: The \"quit\" command in the command channel does NOT " -"disconnect the tunnels like SAM." +"NOTE: The \"quit\" command in the command channel does NOT disconnect" +" the tunnels like SAM." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:245 @@ -1816,14 +1691,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:298 msgid "" -"Pretty cool isn't it? Try some other well known I2P SITES if you like, " -"nonexistent ones,\n" -"etc, to get a feel for what kind of output to expect in different " -"situations.\n" -"For the most part, it is suggested that you ignore any of the error " -"messages.\n" -"They would be meaningless to the application, and are only presented for " -"human debugging." +"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n" +"etc, to get a feel for what kind of output to expect in different situations.\n" +"For the most part, it is suggested that you ignore any of the error messages.\n" +"They would be meaningless to the application, and are only presented for human debugging." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:305 @@ -1840,8 +1711,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:335 msgid "" -"Now to remove \"ear\", note that this is what happens when you type too " -"fast,\n" +"Now to remove \"ear\", note that this is what happens when you type too fast,\n" "and shows you what typical ERROR messages looks like." msgstr "" @@ -1896,16 +1766,11 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:7 #, python-format msgid "" -"Datagrams build upon the base I2CP to provide " -"authenticated\n" -"and repliable messages in a standard format. This lets applications " -"reliably read\n" -"the \"from\" address out of a datagram and know that the address really " -"sent the\n" -"message. This is necessary for some applications since the base I2P " -"message is\n" -"completely raw - it has no \"from\" address (unlike IP packets). In " -"addition, the\n" +"Datagrams build upon the base I2CP to provide authenticated\n" +"and repliable messages in a standard format. This lets applications reliably read\n" +"the \"from\" address out of a datagram and know that the address really sent the\n" +"message. This is necessary for some applications since the base I2P message is\n" +"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n" "message and sender are authenticated by signing the payload." msgstr "" @@ -1914,8 +1779,7 @@ msgstr "" msgid "" "Datagrams, like streaming library packets,\n" "are an application-level construct.\n" -"These protocols are independent of the low-level transports;\n" +"These protocols are independent of the low-level transports;\n" "the protocols are converted to I2NP messages by the router, and\n" "either protocol may be carried by either transport." msgstr "" @@ -1931,8 +1795,7 @@ msgid "" "datagram API,\n" "while applications in other languages \n" "can use SAM's datagram support.\n" -"There is also limited support in i2ptunnel in the SOCKS proxy,\n" +"There is also limited support in i2ptunnel in the SOCKS proxy,\n" "the 'streamr' tunnel types, and udpTunnel classes." msgstr "" @@ -1942,34 +1805,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:38 msgid "" -"The application designer should carefully consider the tradeoff of " -"repliable vs. non-repliable\n" -"datagrams. Also, the datagram size will affect reliability, due to tunnel" -" fragmentation into 1KB\n" -"tunnel messages. The more message fragments, the more likely that one of " -"them will be dropped\n" -"by an intermediate hop. Messages larger than a few KB are not " -"recommended.\n" +"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n" +"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n" +"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n" +"by an intermediate hop. Messages larger than a few KB are not recommended.\n" "Over about 10 KB, the delivery probablility drops dramatically.\n" -"Messages over 16 KB cannot be delivered over NTCP, dropping delivery " -"chances even more." +"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:47 #, python-format msgid "" -"Also note that the various overheads added by lower layers, in particular" -" asymmetric\n" -"ElGamal/AES, place a large burden on " -"intermittent messages\n" -"such as used by a Kademlia-over-UDP application. The implementations are " -"currently tuned\n" -"for frequent traffic using the streaming library. There are a high number" -"\n" -"of session tags delivered, and a short session tag lifetime, for example." -"\n" -"There are currently no configuration parameters available within I2CP to " -"tune\n" +"Also note that the various overheads added by lower layers, in particular asymmetric\n" +"ElGamal/AES, place a large burden on intermittent messages\n" +"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n" +"for frequent traffic using the streaming library. There are a high number\n" +"of session tags delivered, and a short session tag lifetime, for example.\n" +"There are currently no configuration parameters available within I2CP to tune\n" "the ElGamal Session Tag parameters." msgstr "" @@ -1982,38 +1834,30 @@ msgid "" "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n" "Applications may or may not choose to set the\n" "protocol in the I2CP header. It is not set by default.\n" -"It must be set to demultiplex datagram and streaming traffic received on " -"the same Destination." +"It must be set to demultiplex datagram and streaming traffic received on the same Destination." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:65 #, python-format msgid "" "As datagrams are not connection-oriented, the application may require\n" -"port numbers to correlate datagrams with particular peers or " -"communications sessions,\n" +"port numbers to correlate datagrams with particular peers or communications sessions,\n" "as is traditional with UDP over IP.\n" -"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as " -"described in\n" +"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n" "the I2CP page." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:73 #, python-format msgid "" -"There is no method within the datagram API to specify whether it is non-" -"repliable (raw)\n" -"or repliable. The application should be designed to expect the " -"appropriate type.\n" +"There is no method within the datagram API to specify whether it is non-repliable (raw)\n" +"or repliable. The application should be designed to expect the appropriate type.\n" "The I2CP protocol number or port should be used by the application to\n" "indicate datagram type.\n" -"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW " -"are defined in the\n" +"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n" "I2PSession API\n" -"for this purpose. A common design pattern in client/server datagram " -"applications is to\n" -"use signed datagrams for a request which includes a nonce, and use a raw " -"datagram\n" +"for this purpose. A common design pattern in client/server datagram applications is to\n" +"use signed datagrams for a request which includes a nonce, and use a raw datagram\n" "for the reply, returning the nonce from the request." msgstr "" @@ -2047,15 +1891,13 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:107 #, python-format msgid "" -"Each datagram is sent through I2P as a single message (or as an " -"individual clove in a\n" +"Each datagram is sent through I2P as a single message (or as an individual clove in a\n" "Garlic Message).\n" "Message encapsulation is implemented in the underlying\n" "I2CP,\n" "I2NP, and\n" "tunnel message layers.\n" -"There is no packet delimiter mechanism or length field in the datagram " -"protocol." +"There is no packet delimiter mechanism or length field in the datagram protocol." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:120 @@ -2074,17 +1916,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:6 #, python-format msgid "" -"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n" -"The aim of the interface is to provide simple way to interface with a " -"running I2P node. A client, itoopie, has been developed in parallel.\n" -"The JSONRPC2 implementation for the client as well as the plugin is " -"provided by the java libraries JSON-RPC 2.0. \n" -"A list of implementations of JSON-RPC for various languages can be found " -"at the JSON-RPC " -"wiki." +"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n" +"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n" +"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n" +"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:13 @@ -2139,8 +1974,8 @@ msgstr "وصف" #: i2p2www/pages/site/docs/api/i2pcontrol.html:49 msgid "" -"Token used for authenticating every request (excluding the 'Authenticate'" -" RPC method)" +"Token used for authenticating every request (excluding the 'Authenticate' " +"RPC method)" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:57 @@ -2149,8 +1984,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:58 msgid "" -"Creates and returns an authentication token used for further " -"communication." +"Creates and returns an authentication token used for further communication." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:60 @@ -2183,8 +2017,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:118 #: i2p2www/pages/site/docs/api/i2pcontrol.html:171 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:74 @@ -2246,7 +2080,8 @@ msgid "Returns true if any changes were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:99 -msgid "Returns true if any changes requiring a restart to take effect were made." +msgid "" +"Returns true if any changes requiring a restart to take effect were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:102 @@ -2319,8 +2154,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:165 msgid "" -"Initiates a router reseed, fetching peers into our NetDB from a remote " -"host." +"Initiates a router reseed, fetching peers into our NetDB from a remote host." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:166 @@ -2329,8 +2163,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:167 msgid "" -"Restarts the router gracefully (waits for participating tunnels to " -"expire)." +"Restarts the router gracefully (waits for participating tunnels to expire)." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:168 @@ -2376,7 +2209,8 @@ msgid "Blocking. If requested, returns the status of the the update" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:183 -msgid "Fetches or sets various network related settings. Ports, addresses etc." +msgid "" +"Fetches or sets various network related settings. Ports, addresses etc." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:185 @@ -2387,8 +2221,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:186 msgid "" -"What hostname is used for the TCP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the TCP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:187 @@ -2405,8 +2239,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:189 msgid "" -"What hostname is used for the UDP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the UDP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:190 @@ -2420,19 +2254,20 @@ msgid "What ip has been detected by the UDP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:192 -msgid "Is UPnP enabled. If null is submitted, current setting will be returned." +msgid "" +"Is UPnP enabled. If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:193 msgid "" -"How many percent of bandwidth is usable for participating tunnels. If " -"null is submitted, current setting will be returned." +"How many percent of bandwidth is usable for participating tunnels. If null " +"is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:194 msgid "" -"How many KB/s of inbound bandwidth is allowed. If null is submitted, " -"current setting will be returned." +"How many KB/s of inbound bandwidth is allowed. If null is submitted, current" +" setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:195 @@ -2443,15 +2278,15 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:196 msgid "" -"Is laptop mode enabled (change router identity and UDP port when IP " -"changes ). If null is submitted, current setting will be returned." +"Is laptop mode enabled (change router identity and UDP port when IP changes " +"). If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:197 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method. If null is submitted, current setting will" -" be returned." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method. If null is submitted, current setting will be " +"returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:204 @@ -2464,8 +2299,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:206 msgid "" -"If requested, returns the method used for automatically detecting ip for " -"the TCP transport." +"If requested, returns the method used for automatically detecting ip for the" +" TCP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:207 @@ -2478,8 +2313,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:209 msgid "" -"If requested, returns methods used for detecting the ip address of the " -"UDP transport." +"If requested, returns methods used for detecting the ip address of the UDP " +"transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:210 @@ -2610,34 +2445,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:249 msgid "" -"The version of the I2PControl API used wasn't specified, but is required " -"to be specified." +"The version of the I2PControl API used wasn't specified, but is required to " +"be specified." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:250 msgid "" -"The version of the I2PControl API specified is not supported by " -"I2PControl." +"The version of the I2PControl API specified is not supported by I2PControl." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:8 #, python-format msgid "" "I2PTunnel is a tool for interfacing with and providing services on I2P.\n" -"Destination of an I2PTunnel can be defined using a hostname,\n" -"Base32, or a full 516-byte destination " -"key.\n" -"An established I2PTunnel will be available on your client machine as " -"localhost:port.\n" -"If you wish to provide a service on I2P network, you simply create " -"I2PTunnel to the\n" -"appropriate ip_address:port. A corresponding 516-byte destination key " -"will be generated\n" +"Destination of an I2PTunnel can be defined using a hostname,\n" +"Base32, or a full 516-byte destination key.\n" +"An established I2PTunnel will be available on your client machine as localhost:port.\n" +"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n" +"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n" "for the service and it will become avaliable throughout I2P.\n" "A web interface for I2PTunnel management is avaliable on\n" -"localhost:7657/i2ptunnel/." +"localhost:7657/i2ptunnel/." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:20 @@ -2651,8 +2479,7 @@ msgstr "أنفاق الخادم" #: i2p2www/pages/site/docs/api/i2ptunnel.html:23 msgid "" "I2P Webserver - A tunnel pointed to a Jetty webserver run\n" -"on localhost:7658 for convenient " -"and quick hosting on I2P.\n" +"on localhost:7658 for convenient and quick hosting on I2P.\n" "
The document root is:" msgstr "" @@ -2662,10 +2489,8 @@ msgstr "أنفاق العميل" #: i2p2www/pages/site/docs/api/i2ptunnel.html:33 msgid "" -"A HTTP proxy used for browsing I2P and the regular internet anonymously " -"through I2P. \n" -"Browsing internet through I2P uses a random proxy specified by the " -"\"Outproxies:\" option." +"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n" +"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:37 @@ -2701,24 +2526,20 @@ msgstr "عادي" #: i2p2www/pages/site/docs/api/i2ptunnel.html:55 msgid "" -"Opens a local TCP port that connects to a service (like HTTP, FTP or " -"SMTP) on a destination inside of I2P.\n" -"The tunnel is directed to a random host from the comma seperated (\", \")" -" list of destinations." +"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n" +"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:61 msgid "" -"A HTTP-client tunnel. The tunnel connects to the destination specified by" -" the URL\n" -"in a HTTP request. Supports proxying onto internet if an outproxy is " -"provided. Strips HTTP connections of the following headers:" +"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n" +"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:132 msgid "" -"Depending on if the tunnel is using an outproxy or not it will append the" -" following User-Agent:" +"Depending on if the tunnel is using an outproxy or not it will append the " +"following User-Agent:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:136 @@ -2731,10 +2552,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:142 msgid "" -"Creates a connection to a random IRC server specified by the comma " -"seprated (\", \") \n" -"list of destinations. Only a whitelisted subset of IRC commands are " -"allowed due to anonymity concerns." +"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n" +"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:181 @@ -2743,8 +2562,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:186 msgid "" -"Enables using the I2P router as a SOCKS proxy with the command whitelist " -"specified by\n" +"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n" "IRC client mode." msgstr "" @@ -2756,8 +2574,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:198 msgid "" -"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr " -"client tunnel will \n" +"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n" "subscribe to a streamr server tunnel." msgstr "" @@ -2771,32 +2588,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:213 msgid "" -"Creates a destination to a local HTTP server ip:port. Supports gzip for " -"requests with \n" -"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in" -" such a request." +"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n" +"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:263 msgid "" -"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client " -"with no outproxying\n" -"capabilities. An example application would be a web application that does" -" client-type\n" +"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n" +"capabilities. An example application would be a web application that does client-type\n" "requests, or loopback-testing an I2P Site as a diagnostic tool." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:270 msgid "" -"Creates a destination that filters the reqistration sequence of a client " -"and passes \n" +"Creates a destination that filters the reqistration sequence of a client and passes \n" "the clients destination key as a hostname to the IRC-server." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:276 msgid "" -"A UDP-client that connects to a media server is created. The UDP-Client " -"is coupled with a Streamr server I2PTunnel." +"A UDP-client that connects to a media server is created. The UDP-Client is " +"coupled with a Streamr server I2PTunnel." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:2 @@ -2813,14 +2625,11 @@ msgstr "ملاحظة" msgid "" "The ministreaming library has been enhanced and extended by the\n" "\"full\" streaming library.\n" -"Ministreaming is deprecated and is incompatible with today's " -"applications.\n" +"Ministreaming is deprecated and is incompatible with today's applications.\n" "The following documentation is old.\n" -"Also note that streaming extends ministreaming in the same Java package " -"(net.i2p.client.streaming),\n" +"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n" "so the current API documentation contains both.\n" -"Obsolete ministreaming classes and methods are clearly marked as " -"deprecated in the Javadocs." +"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:19 @@ -2828,17 +2637,12 @@ msgstr "" msgid "" "\n" "The ministreaming library is a layer on top of the core \n" -"I2CP that allows reliable, in order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"I2CP that allows reliable, in order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" @@ -2846,42 +2650,29 @@ msgstr "" #, python-format msgid "" "The ministreaming library was written by mihi as a part of his \n" -"I2PTunnel application and then factored out" -" and released\n" -"under the BSD license. It is called the \"mini\"streaming library " -"because it makes\n" -"some simplifications in the implementation, while a more robust streaming" -" library\n" -"could be further optimized for operation over I2P. The two main issues " -"with \n" +"I2PTunnel application and then factored out and released\n" +"under the BSD license. It is called the \"mini\"streaming library because it makes\n" +"some simplifications in the implementation, while a more robust streaming library\n" +"could be further optimized for operation over I2P. The two main issues with \n" "the ministreaming library are its use of the traditional TCP two phase \n" -"establishment protocol and the current fixed window size of 1. The " -"establishment\n" -"issue is minor for long lived streams, but for short ones, such as quick " -"HTTP\n" -"requests, the impact can be significant. As " -"for the window\n" -"size, the ministreaming library doesn't maintain any ID or ordering " -"within the \n" -"messages sent (or include any application level ACK or SACK), so it must " -"wait \n" -"on average twice the time it takes to send a message before sending " -"another." +"establishment protocol and the current fixed window size of 1. The establishment\n" +"issue is minor for long lived streams, but for short ones, such as quick HTTP\n" +"requests, the impact can be significant. As for the window\n" +"size, the ministreaming library doesn't maintain any ID or ordering within the \n" +"messages sent (or include any application level ACK or SACK), so it must wait \n" +"on average twice the time it takes to send a message before sending another." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:45 #, python-format msgid "" -"Even with those issues, the ministreaming library performs quite well in " -"many\n" +"Even with those issues, the ministreaming library performs quite well in many\n" "situations, and its API\n" -"is both quite simple and capable of remaining unchanged as different " -"streaming\n" +"is both quite simple and capable of remaining unchanged as different streaming\n" "implementations are introduced. The library is deployed in its own \n" "ministreaming.jar.\n" "Developers in Java who would like to use it can\n" -"access the API directly, while developers in other languages can use it " -"through\n" +"access the API directly, while developers in other languages can use it through\n" "SAM's streaming support." msgstr "" @@ -2920,8 +2711,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:5 msgid "" "\n" -"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are " -"supported.\n" +"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n" "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n" "Both shared-clients and non-shared are supported.\n" "There is no SOCKS outproxy so it is of limited use." @@ -2942,8 +2732,7 @@ msgid "" "information as content, I2P has no way to protect your anonymity. For\n" "example, some mail applications will send the IP address of the machine\n" "they are running on to a mail server. There is no way for I2P to filter\n" -"this, thus using I2P to 'socksify' existing applications is possible, but" -"\n" +"this, thus using I2P to 'socksify' existing applications is possible, but\n" "extremely dangerous." msgstr "" @@ -3026,47 +2815,34 @@ msgstr "" #, python-format msgid "" "The streaming library is a layer on top of the core \n" -"I2CP API that allows reliable, in-order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"I2CP API that allows reliable, in-order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:29 msgid "" "In consideration of the relatively high cost of messages, \n" -"the streaming library's protocol for scheduling and delivering those " -"messages has been optimized to\n" -"allow individual messages passed to contain as much information as is " -"available.\n" -"For instance, a small HTTP transaction proxied through the streaming " -"library can\n" -"be completed in a single round trip - the first messages bundle a SYN, " -"FIN, and\n" +"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n" +"allow individual messages passed to contain as much information as is available.\n" +"For instance, a small HTTP transaction proxied through the streaming library can\n" +"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n" "the small HTTP request payload, and the reply bundles the SYN,\n" "FIN, ACK, and the HTTP response payload. While an additional\n" -"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has " -"been\n" -"received, the local HTTP proxy can often deliver the full response to the" -" browser \n" +"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n" +"received, the local HTTP proxy can often deliver the full response to the browser \n" "immediately." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:42 msgid "" "The streaming library bears much resemblance to an \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms\n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK,\n" +"abstraction of TCP, with its sliding windows, congestion control algorithms\n" +"(both slow start and congestion avoidance), and general packet behavior (ACK,\n" "SYN, FIN, RST, rto calculation, etc)." msgstr "" @@ -3086,29 +2862,21 @@ msgstr "API" #: i2p2www/pages/site/docs/api/streaming.html:60 #, python-format msgid "" -"The streaming library API provides a standard socket paradigm to Java " -"applications.\n" -"The lower-level I2CP API is completely hidden, " -"except that\n" -"applications may pass I2CP parameters " -"through the\n" +"The streaming library API provides a standard socket paradigm to Java applications.\n" +"The lower-level I2CP API is completely hidden, except that\n" +"applications may pass I2CP parameters through the\n" "streaming library, to be interpreted by I2CP." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:67 #, python-format msgid "" -"The standard interface to the streaming lib is for the application to use" -" the\n" +"The standard interface to the streaming lib is for the application to use the\n" "I2PSocketManagerFactory to create an\n" -"I2PSocketManager. The application then asks " -"the\n" -"socket manager for an I2PSession, which will " -"cause\n" -"a connection to the router via I2CP. The " -"application\n" -"can then setup connections with an I2PSocket " -"or\n" +"I2PSocketManager. The application then asks the\n" +"socket manager for an I2PSession, which will cause\n" +"a connection to the router via I2CP. The application\n" +"can then setup connections with an I2PSocket or\n" "receive connections with an I2PServerSocket." msgstr "" @@ -3129,17 +2897,12 @@ msgstr "" #, python-format msgid "" "The options and current default values are listed below.\n" -"Options are case-sensitive and may be set for the whole router, for a " -"particular client, or for an individual socket on a\n" +"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n" "per-connection basis.\n" -"Many values are tuned for HTTP performance over typical I2P conditions. " -"Other applications such\n" +"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n" "as peer-to-peer services are strongly encouraged to\n" -"modify as necessary, by setting the options and passing them via the call" -" to\n" -"I2PSocketManagerFactory.createManager(_i2cpHost," -" _i2cpPort, opts).\n" +"modify as necessary, by setting the options and passing them via the call to\n" +"I2PSocketManagerFactory.createManager(_i2cpHost, _i2cpPort, opts).\n" "Time values are in ms." msgstr "" @@ -3147,17 +2910,14 @@ msgstr "" #, python-format msgid "" "Note that higher-layer APIs, such as SAM,\n" -"BOB, and I2PTunnel," -"\n" +"BOB, and I2PTunnel,\n" "may override these defaults with their own defaults.\n" -"Also note that many options only apply to servers listening for incoming " -"connections." +"Also note that many options only apply to servers listening for incoming connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:110 msgid "" -"As of release 0.9.1, most, but not all, options may be changed on an " -"active socket manager or session.\n" +"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n" "See the javadocs for details." msgstr "" @@ -3181,8 +2941,8 @@ msgstr " 1. مسودة" #: i2p2www/pages/site/docs/api/streaming.html:119 msgid "" -"Comma- or space-separated list of Base64 peer Hashes used for either " -"access list or blacklist." +"Comma- or space-separated list of Base64 peer Hashes used for either access " +"list or blacklist." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:121 @@ -3232,24 +2992,21 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes to be\n" "blacklisted for incoming connections to ALL destinations in the context.\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:175 msgid "" -"How much transmit data (in bytes) will be accepted that hasn't been " -"written out yet." +"How much transmit data (in bytes) will be accepted that hasn't been written " +"out yet." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:179 msgid "" "When we're in congestion avoidance, we grow the window size at the rate\n" -"of 1/(windowSize*factor). In standard TCP, window sizes are" -" in bytes,\n" +"of 1/(windowSize*factor). In standard TCP, window sizes are in bytes,\n" "while in I2P, window sizes are in messages.\n" "A higher number means slower growth." msgstr "" @@ -3258,16 +3015,15 @@ msgstr "" msgid "" "How long to wait after instantiating a new con \n" "before actually attempting to connect. If this is\n" -"<= 0, connect immediately with no initial data. If greater than 0, " -"wait\n" +"<= 0, connect immediately with no initial data. If greater than 0, wait\n" "until the output stream is flushed, the buffer fills, \n" "or that many milliseconds pass, and include any initial data with the SYN." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:194 msgid "" -"How long to block on connect, in milliseconds. Negative means " -"indefinitely. Default is 5 minutes." +"How long to block on connect, in milliseconds. Negative means indefinitely. " +"Default is 5 minutes." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:198 @@ -3280,30 +3036,24 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes or host names to be\n" "contacted using an alternate DSA destination.\n" -"Only applies if multisession is enabled and the primary session is non-" -"DSA\n" +"Only applies if multisession is enabled and the primary session is non-DSA\n" "(generally for shared clients only).\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:216 msgid "" "Whether to listen only for the streaming protocol.\n" -"Setting to true will prohibit communication with Destinations earlier " -"than release 0.7.1\n" -"(released March 2009). Set to true if running multiple protocols on this " -"Destination." +"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n" +"(released March 2009). Set to true if running multiple protocols on this Destination." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:226 msgid "" "(0=noop, 1=disconnect)\n" -"What to do on an inactivity timeout - do nothing, disconnect, or send a " -"duplicate ack." +"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:232 @@ -3316,8 +3066,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:237 msgid "" -"The initial value of the resend delay field in the packet header, times " -"1000.\n" +"The initial value of the resend delay field in the packet header, times 1000.\n" "Not fully implemented; see below." msgstr "" @@ -3340,8 +3089,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:255 msgid "" -"In standard TCP, window sizes are in bytes, while in I2P, window sizes " -"are in messages." +"In standard TCP, window sizes are in bytes, while in I2P, window sizes are " +"in messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:279 @@ -3383,12 +3132,12 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:333 msgid "" "(2=interactive not supported)\n" -"This doesn't currently do anything, but setting it to a value other than " -"1 will cause an error." +"This doesn't currently do anything, but setting it to a value other than 1 will cause an error." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:338 -msgid "How long to block on read, in milliseconds. Negative means indefinitely." +msgid "" +"How long to block on read, in milliseconds. Negative means indefinitely." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:342 @@ -3431,19 +3180,15 @@ msgstr "إنشاء" #: i2p2www/pages/site/docs/api/streaming.html:387 msgid "" -"The initiator sends a packet with the SYNCHRONIZE flag set. This packet " -"may contain the initial data as well.\n" -"The peer replies with a packet with the SYNCHRONIZE flag set. This packet" -" may contain the initial response data as well." +"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n" +"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:392 msgid "" -"The initiator may send additional data packets, up to the initial window " -"size, before receiving the SYNCHRONIZE response.\n" +"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n" "These packets will also have the send Stream ID field set to 0.\n" -"Recipients must buffer packets received on unknown streams for a short " -"period of time, as they may\n" +"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n" "arrive out of order, in advance of the SYNCHRONIZE packet." msgstr "" @@ -3453,33 +3198,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:400 msgid "" -"The maximum message size (also called the MTU / MRU) is negotiated to the" -" lower value supported by\n" -"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection" -" will lead to\n" +"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n" +"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n" "a large amount of overhead.\n" "The MTU is specified by the option i2p.streaming.maxMessageSize.\n" -"The current default MTU of 1730 was chosen to fit precisely into two 1K " -"I2NP tunnel messages,\n" +"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n" "including overhead for the typical case." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:417 msgid "" -"The first message in a connection includes a 387 byte (typical) " -"Destination added by the streaming layer,\n" -"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in " -"the Garlic message by the router.\n" -"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session " -"was previously established).\n" -"Therefore, the goal of fitting a complete HTTP request in a single 1KB " -"I2NP message is not always attainable.\n" -"However, the selection of the MTU, together with careful implementation " -"of fragmentation\n" -"and batching strategies in the tunnel gateway processor, are important " -"factors in network bandwidth,\n" -"latency, reliability, and efficiency, especially for long-lived " -"connections." +"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n" +"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n" +"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n" +"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n" +"However, the selection of the MTU, together with careful implementation of fragmentation\n" +"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n" +"latency, reliability, and efficiency, especially for long-lived connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:428 @@ -3493,14 +3228,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:436 #, python-format msgid "" -"Each packet is sent through I2P as a single message (or as an individual " -"clove in a\n" -"Garlic Message). Message encapsulation " -"is implemented\n" -"in the underlying I2CP, I2NP, and\n" -"tunnel message layers. There is no " -"packet delimiter\n" +"Each packet is sent through I2P as a single message (or as an individual clove in a\n" +"Garlic Message). Message encapsulation is implemented\n" +"in the underlying I2CP, I2NP, and\n" +"tunnel message layers. There is no packet delimiter\n" "mechanism or payload length field in the streaming protocol." msgstr "" @@ -3510,17 +3241,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:447 msgid "" -"Data packets may include an optional delay field specifying the requested" -" delay,\n" +"Data packets may include an optional delay field specifying the requested delay,\n" "in ms, before the receiver should ack the packet.\n" "Valid values are 0 to 60000 inclusive.\n" "A value of 0 requests an immediate ack.\n" "This is advisory only, and receivers should delay slightly so that\n" "additional packets may be acknowledged with a single ack.\n" -"Some implementations may include an advisory value of (measured RTT / 2) " -"in this field.\n" -"For nonzero optional delay values, receivers should limit the maximum " -"delay\n" +"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n" +"For nonzero optional delay values, receivers should limit the maximum delay\n" "before sending an ack to a few seconds at most.\n" "Optional delay values greater than 60000 indicate choking, see below." msgstr "" @@ -3532,46 +3260,33 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:462 msgid "" "TCP headers include the receive window in bytes.\n" -"The streaming protocol does not contain a receive window, it uses only a " -"simple choke/unchoke indication.\n" -"Each endpoint must maintain its own estimate of the far-end receive " -"window, in either bytes or packets.\n" -"The recommended minimum buffer size for receiver implementations is 128 " -"packets or 217 KB (approximately 128x1730).\n" -"Because of I2P netowrk latency, packet drops, and the resulting " -"congestion control,\n" +"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n" +"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n" +"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n" +"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n" "a buffer of this size is rarely filled.\n" -"Overflow is, however, likely to occur on high-bandwidth \"local " -"loopback\" (same-router) connections." +"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:471 msgid "" "To quickly indicate and smoothly recover from overflow conditions,\n" "there is a simple mechanism for pushback in the streaming protocol.\n" -"If a packet is received with an optional delay field of value of 60001 or" -" higher,\n" +"If a packet is received with an optional delay field of value of 60001 or higher,\n" "that indicates \"choking\" or a receive window of zero.\n" -"A packet with an optional delay field of value of 60000 or less indicates" -" \"unchoking\".\n" -"Packets without an optional delay field do not affect the choke/unchoke " -"state." +"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n" +"Packets without an optional delay field do not affect the choke/unchoke state." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:479 msgid "" -"After being choked, no more packets with data should be sent until the " -"transmitter is unchoked,\n" -"except for occasional \"probe\" data packets to compensate for possible " -"lost unchoke packets.\n" -"The choked endpoint should start a \"persist timer\" to control the " -"probing, as in TCP.\n" +"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n" +"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n" +"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n" "The unchoking endpoint should send several packets with this field set,\n" -"or continue sending them periodically until data packets are received " -"again.\n" +"or continue sending them periodically until data packets are received again.\n" "Maximum time to wait for unchoking is implementation-dependent.\n" -"Transmitter window size and congestion control strategy after being " -"unchoked is implementation-dependent." +"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:490 @@ -3580,8 +3295,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:491 msgid "" -"The streaming lib uses standard slow-start (exponential window growth) " -"and congestion avoidance (linear window growth)\n" +"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n" "phases, with exponential backoff.\n" "Windowing and acknowledgments use packet count, not byte count." msgstr "" @@ -3592,53 +3306,44 @@ msgstr "أغلق" #: i2p2www/pages/site/docs/api/streaming.html:499 msgid "" -"Any packet, including one with the SYNCHRONIZE flag set, may have the " -"CLOSE flag sent as well.\n" -"The connection is not closed until the peer responds with the CLOSE flag." -"\n" +"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n" +"The connection is not closed until the peer responds with the CLOSE flag.\n" "CLOSE packets may contain data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:507 msgid "" -"There is no ping function at the I2CP layer (equivalent to ICMP echo) or " -"in datagrams.\n" +"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n" "This function is provided in streaming.\n" "Pings and pongs may not be combined with a standard streaming packet;\n" "if the ECHO option is set, then\n" -"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are " -"ignored." +"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:515 msgid "" -"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED " -"flags set.\n" -"The sendStreamId must be greater than zero, and the receiveStreamId is " -"ignored.\n" +"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n" +"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n" "The sendStreamId may or may not correspond to an existing connection." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:521 msgid "" "A pong packet must have the ECHO flag set.\n" -"The sendStreamId must be zero, and the receiveStreamId is the " -"sendStreamId from the ping.\n" -"Prior to release 0.9.18, the pong packet does not include any payload " -"that was contained in the ping." +"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n" +"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:527 msgid "" "As of release 0.9.18, pings and pongs may contain a payload.\n" -"The payload in the ping, up to a maximum of 32 bytes, is returned in the " -"pong." +"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:532 msgid "" -"Streaming may be configured to disable sending pongs with the " -"configuration i2p.streaming.answerPings=false." +"Streaming may be configured to disable sending pongs with the configuration " +"i2p.streaming.answerPings=false." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:537 @@ -3654,8 +3359,7 @@ msgid "" "This is used for \"temporal\" sharing at connection open/close time,\n" "not \"ensemble\" sharing during a connection (See\n" "RFC 2140).\n" -"There is a separate share per ConnectionManager (i.e. per local " -"Destination)\n" +"There is a separate share per ConnectionManager (i.e. per local Destination)\n" "so that there is no information leakage to other Destinations on the\n" "same router.\n" "The share data for a given peer expires after a few minutes.\n" @@ -3668,8 +3372,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:560 msgid "" -"The following parameters are hardcoded, but may be of interest for " -"analysis:" +"The following parameters are hardcoded, but may be of interest for analysis:" msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:579 @@ -3679,25 +3382,16 @@ msgstr "التأريخ" #: i2p2www/pages/site/docs/api/streaming.html:580 msgid "" -"The streaming library has grown organically for I2P - first mihi " -"implemented the\n" -"\"mini streaming library\" as part of I2PTunnel, which was limited to a " -"window\n" -"size of 1 message (requiring an ACK before sending the next one), and " -"then it was\n" -"refactored out into a generic streaming interface (mirroring TCP sockets)" -" and the\n" -"full streaming implementation was deployed with a sliding window protocol" -" and \n" -"optimizations to take into account the high bandwidth x delay product. " -"Individual\n" -"streams may adjust the maximum packet size and other options. The default" -"\n" -"message size is selected to fit precisely in two 1K I2NP tunnel messages," -"\n" +"The streaming library has grown organically for I2P - first mihi implemented the\n" +"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n" +"size of 1 message (requiring an ACK before sending the next one), and then it was\n" +"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n" +"full streaming implementation was deployed with a sliding window protocol and \n" +"optimizations to take into account the high bandwidth x delay product. Individual\n" +"streams may adjust the maximum packet size and other options. The default\n" +"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n" "and is a reasonable tradeoff between the bandwidth costs of \n" -"retransmitting lost messages, and the latency and overhead of multiple " -"messages." +"retransmitting lost messages, and the latency and overhead of multiple messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:594 @@ -3728,20 +3422,16 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:604 #, python-format msgid "" -"Another area for research is the interaction of the streaming lib with " -"the\n" +"Another area for research is the interaction of the streaming lib with the\n" "NTCP and SSU transport layers.\n" "See the NTCP discussion page for details." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:609 msgid "" -"The interaction of the routing algorithms with the streaming lib strongly" -" affects performance.\n" -"In particular, random distribution of messages to multiple tunnels in a " -"pool\n" -"leads to a high degree of out-of-order delivery which results in smaller " -"window\n" +"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n" +"In particular, random distribution of messages to multiple tunnels in a pool\n" +"leads to a high degree of out-of-order delivery which results in smaller window\n" "sizes than would otherwise be the case. The router currently routes \n" "messages for a single from/to destination pair through a consistent set \n" "of tunnels, until tunnel expiration or delivery failure. The router's \n" @@ -3776,11 +3466,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:636 msgid "" -"zzz has added debug code to the streaming library to log packets in a " -"wireshark-compatible\n" +"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n" "(pcap) format; Use this to further analyze performance.\n" -"The format may require enhancement to map more streaming lib parameters " -"to TCP fields." +"The format may require enhancement to map more streaming lib parameters to TCP fields." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:641 @@ -3795,18 +3483,15 @@ msgstr "" msgid "" "There are several bittorrent clients and trackers on I2P.\n" "As I2P addressing uses a Destination instead of an IP and port, minor\n" -"changes are required to tracker and client software for operation on I2P." -"\n" +"changes are required to tracker and client software for operation on I2P.\n" "These changes are specified below.\n" -"Note carefully the guidelines for compatibility with older I2P clients " -"and trackers." +"Note carefully the guidelines for compatibility with older I2P clients and trackers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:15 msgid "" "This page specifies protocol details common to all clients and trackers.\n" -"Specific clients and trackers may implement other unique features or " -"protocols." +"Specific clients and trackers may implement other unique features or protocols." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:20 @@ -3819,8 +3504,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:27 msgid "" -"Clients generally include a fake port=6881 parameter in the announce, for" -" compatibility with older trackers.\n" +"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n" "Trackers may ignore the port parameter, and should not require it." msgstr "" @@ -3832,8 +3516,7 @@ msgid "" "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n" "Destinations\n" "are 387+ bytes, so the Base 64 is 516+ bytes.\n" -"Clients generally append \".i2p\" to the Base 64 Destination for " -"compatibility with older trackers.\n" +"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n" "Trackers should not require an appended \".i2p\"." msgstr "" @@ -3843,18 +3526,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:46 msgid "" -"Current Destinations for clients are 387 or more bytes (516 or more in " -"Base 64 encoding).\n" +"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n" "A reasonable maximum to assume, for now, is 475 bytes.\n" -"As the tracker must decode the Base64 to deliver compact responses (see " -"below),\n" +"As the tracker must decode the Base64 to deliver compact responses (see below),\n" "the tracker should probably decode and reject bad Base64 when announced." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:53 msgid "" -"The default response type is non-compact. Clients may request a compact " -"response with\n" +"The default response type is non-compact. Clients may request a compact response with\n" "the parameter compact=1. A tracker may, but is not required to, return\n" "a compact response when requested." msgstr "" @@ -3862,10 +3542,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:59 msgid "" "Developers of new I2P clients\n" -"are strongly encouraged to implemenent announces over their own tunnel " -"rather than\n" -"the HTTP client proxy at port 4444. Doing so is both more efficient and " -"it allows\n" +"are strongly encouraged to implemenent announces over their own tunnel rather than\n" +"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n" "destination enforcement by the tracker (see below)." msgstr "" @@ -3887,8 +3565,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:78 msgid "" -"Trackers generally include a fake port key, or use the port from the " -"announce, for compatibility with older clients.\n" +"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n" "Clients must ignore the port parameter, and should not require it." msgstr "" @@ -3896,10 +3573,8 @@ msgstr "" #, python-format msgid "" "The value of the ip key is the base 64 of the client's\n" -"Destination, as " -"described above.\n" -"Trackers generally append \".i2p\" to the Base 64 Destination if it " -"wasn't in the announce ip, for compatibility with older clients.\n" +"Destination, as described above.\n" +"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n" "Clients should not require an appended \".i2p\" in the responses." msgstr "" @@ -3914,26 +3589,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:97 #, python-format msgid "" -"In the compact response, the value of the \"peers\" dictionary key is a " -"single byte string,\n" +"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n" "whose length is a multiple of 32 bytes.\n" "This string contains the concatenated\n" "32-byte SHA-256 Hashes\n" "of the binary\n" "Destinations\n" "of the peers.\n" -"This hash must be computed by the tracker, unless destination enforcement" -"\n" -"(see below) is used, in which case the hash delivered in the X-I2P-" -"DestHash\n" +"This hash must be computed by the tracker, unless destination enforcement\n" +"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n" "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n" "The peers key may be absent, or the peers value may be zero-length." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:111 msgid "" -"While compact response support is optional for both clients and trackers," -" it is highly\n" +"While compact response support is optional for both clients and trackers, it is highly\n" "recommended as it reduces the nominal response size by over 90%." msgstr "" @@ -3944,34 +3615,27 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:119 #, python-format msgid "" -"Some, but not all, I2P bittorrent clients announce over their own " -"tunnels.\n" -"Trackers may choose to prevent spoofing by requiring this, and verifying " -"the\n" +"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n" +"Trackers may choose to prevent spoofing by requiring this, and verifying the\n" "client's\n" "Destination\n" "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n" -"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which " -"are\n" +"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n" "different formats for the same information.\n" "These headers cannot be spoofed by the client.\n" -"A tracker enforcing destinations need not require the ip announce " -"parameter at all." +"A tracker enforcing destinations need not require the ip announce parameter at all." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:131 msgid "" -"As several clients use the HTTP proxy instead of their own tunnel for " -"announces,\n" -"destination enforcement will prevent usage by those clients unless or " -"until\n" +"As several clients use the HTTP proxy instead of their own tunnel for announces,\n" +"destination enforcement will prevent usage by those clients unless or until\n" "those clients are converted to announcing over their own tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:137 msgid "" -"Unfortunately, as the network grows, so will the amount of maliciousness," -"\n" +"Unfortunately, as the network grows, so will the amount of maliciousness,\n" "so we expect that all trackers will eventually enforce destinations.\n" "Both tracker and client developers should anticipate it." msgstr "" @@ -3985,12 +3649,9 @@ msgstr "" msgid "" "Announce URL host names in torrent files generally follow the\n" "I2P naming standards.\n" -"In addition to host names from address books and \".b32.i2p\" Base 32 " -"hostnames,\n" -"the full Base 64 Destination (with [or without?] \".i2p\" appended) " -"should be supported.\n" -"Non-open trackers should recognize their own host name in any of these " -"formats." +"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n" +"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n" +"Non-open trackers should recognize their own host name in any of these formats." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:154 @@ -4012,27 +3673,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:167 #, python-format msgid "" -"I2P uses 387+ byte Destinations\n" +"I2P uses 387+ byte Destinations\n" "for addresses, as explained above." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:172 msgid "" -"If the client has only the hash of the destination (such as from a " -"compact response or PEX), it must perform a lookup\n" -"by encoding it with Base 32, appending \".b32.i2p\", and querying the " -"Naming Service,\n" +"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n" +"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n" "which will return the full Destination if available." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:178 msgid "" -"If the client has a peer's full Destination it received in a non-compact " -"response, it should use it\n" +"If the client has a peer's full Destination it received in a non-compact response, it should use it\n" "directly in the connection setup.\n" -"Do not convert a Destination back to a Base 32 hash for lookup, this is " -"quite inefficient." +"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:185 @@ -4042,40 +3698,32 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:186 msgid "" "To preserve anonymity,\n" -"I2P bittorrent clients generally do not support non-I2P announces or peer" -" connections.\n" +"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n" "I2P HTTP outproxies often block announces.\n" "There are no known SOCKS outproxies supporting bittorrent traffic." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:193 msgid "" -"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers " -"often\n" +"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n" "block accesses or announces that contain an X-Forwarded-For HTTP header.\n" -"Trackers should reject standard network announces with IPv4 or IPv6 IPs, " -"and not deliver them in responses." +"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:202 #, python-format msgid "" "I2P PEX is based on ut_pex.\n" -"As there does not appear to be a formal specification of ut_pex " -"available,\n" +"As there does not appear to be a formal specification of ut_pex available,\n" "it may be necessary to review the libtorrent source for assistance.\n" "It is an extension message, identified as \"i2p_pex\" in\n" -"the extension " -"handshake.\n" -"It contains a bencoded dictionary with up to 3 keys, \"added\", " -"\"added.f\", and \"dropped\".\n" -"The added and dropped values are each a single byte string, whose length " -"is a multiple of 32 bytes.\n" +"the extension handshake.\n" +"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n" +"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n" "These byte strings are the concatenated SHA-256 Hashes of the binary\n" "Destinations\n" "of the peers.\n" -"This is the same format as the peers dictionary value in the i2p compact " -"response format specified above.\n" +"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n" "The added.f value, if present, is the same as in ut_pex." msgstr "" @@ -4090,13 +3738,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:228 msgid "" -"Unlike standard DHT, I2P DHT does not use a bit in the options handshake," -" or the PORT message.\n" +"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n" "It is advertised with an extension message, identified as \"i2p_dht\" in\n" -"the extension " -"handshake.\n" -"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", " -"both integers." +"the extension handshake.\n" +"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:237 @@ -4130,14 +3775,12 @@ msgstr "" msgid "" "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n" "instead of 4 byte IP + 2 byte port. There is no peer port.\n" -"In a response, the \"values\" key is a list of strings, each containing a" -" single compact peer info." +"In a response, the \"values\" key is a list of strings, each containing a single compact peer info." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:266 msgid "" -"Compact node info is 54 bytes (20 byte Node ID + 32 byte SHA256 Hash + 2 " -"byte port)\n" +"Compact node info is 54 bytes (20 byte Node ID + 32 byte SHA256 Hash + 2 byte port)\n" "instead of 20 byte Node ID + 4 byte IP + 2 byte port.\n" "In a response, the \"nodes\" key is a\n" "single byte string with concatenated compact node info." @@ -4146,10 +3789,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:273 msgid "" "Secure node ID requirement: To make various DHT attacks more difficult,\n" -"the first 4 bytes of the Node ID must match the first 4 bytes of the " -"destination Hash,\n" -"and the next two bytes of the Node ID must match the next two bytes of " -"the\n" +"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n" +"and the next two bytes of the Node ID must match the next two bytes of the\n" "destination hash exclusive-ORed with the port." msgstr "" @@ -4174,8 +3815,7 @@ msgid "" "Preliminary differences from\n" "BEP 15\n" "are described below, and are subject to change.\n" -"Contact the I2P developers if you wish to develop a client or tracker " -"supporting datagram announces." +"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:301 @@ -4220,19 +3860,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:8 msgid "" -"This page is about bundling the entire I2P router binary with your " -"application.\n" -"It is not about writing an application to work with I2P (either bundled " -"or external)." +"This page is about bundling the entire I2P router binary with your application.\n" +"It is not about writing an application to work with I2P (either bundled or external)." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:13 msgid "" -"Lots of projects are bundling, or talking about bundling, I2P. That's " -"great if done right.\n" +"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n" "If done wrong, it could cause real harm to our network.\n" -"The I2P router is complex, and it can be a challenge to hide all the " -"complexity from your users.\n" +"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n" "This page discusses some general guidelines." msgstr "" @@ -4242,10 +3878,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:24 msgid "" -"Start a dialog. We're here to help. Applications that embed I2P are the " -"most promising - and exciting -\n" -"opportunities for us to grow the network and improve anonymity for " -"everyone." +"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n" +"opportunities for us to grow the network and improve anonymity for everyone." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:30 @@ -4254,11 +3888,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:31 msgid "" -"If your application is in Java or Scala, it's an easy choice - use the " -"Java router.\n" +"If your application is in Java or Scala, it's an easy choice - use the Java router.\n" "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n" -"For apps in other languages, best to use SAM or BOB or SOCKS and bundle " -"the Java router as a separate process.\n" +"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n" "Some of the following only applies to the Java router." msgstr "" @@ -4267,7 +3899,8 @@ msgid "Licensing" msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:40 -msgid "Ensure you meet the license requirements of the software you are bundling." +msgid "" +"Ensure you meet the license requirements of the software you are bundling." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:45 @@ -4276,29 +3909,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:46 msgid "" -"A correct default configuration is crucial. Most users will not change " -"the defaults.\n" -"The defaults for your application may need to be different than the " -"defaults for the router you are bundling.\n" +"A correct default configuration is crucial. Most users will not change the defaults.\n" +"The defaults for your application may need to be different than the defaults for the router you are bundling.\n" "Override the router defaults if necessary." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:51 msgid "" -"Some important defaults to review: Max bandwidth, tunnel quantity and " -"length, max participating tunnels.\n" -"A lot of this depends on the expected bandwidth and usage patterns of " -"your app." +"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n" +"A lot of this depends on the expected bandwidth and usage patterns of your app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:55 msgid "" -"Configure enough bandwidth and tunnels to allow your users to contribute " -"to the network.\n" -"Consider disabling external I2CP, as you probably don't need it and it " -"would conflict with any other running I2P instance.\n" -"Also look at the configs for disabling killing of the JVM on exit, for " -"example." +"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n" +"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n" +"Also look at the configs for disabling killing of the JVM on exit, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:62 @@ -4308,32 +3934,25 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:63 msgid "" "It may be tempting for you to disable participating traffic.\n" -"There's several ways to do this (hidden mode, setting max tunnels to 0, " -"setting shared bandwidth below 12 KBytes/sec).\n" -"Without participating traffic, you don't have to worry about graceful " -"shutdown,\n" +"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n" +"Without participating traffic, you don't have to worry about graceful shutdown,\n" "your users don't see bandwidth usage not generated by them, etc.\n" -"However, there's lots of reasons why you should allow participating " -"tunnels." +"However, there's lots of reasons why you should allow participating tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:70 msgid "" -"First of all, the router doesn't work that well if it doesn't have a " -"chance to \"integrate\" with the network,\n" +"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n" "which is helped tremendously by others building tunnels through you." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:74 msgid "" -"Secondly, over 90% of the routers in the current network allow " -"participating traffic.\n" +"Secondly, over 90% of the routers in the current network allow participating traffic.\n" "It's the default in the Java router.\n" -"If your application doesn't route for others and it gets really popular, " -"then it's a leech on the network,\n" +"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n" "and it upsets the balance we have now.\n" -"If it gets really big, then we become Tor, and spend our time begging for" -" people to enable relaying." +"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:81 @@ -4344,10 +3963,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:84 msgid "" -"We strongly discourage you from disabling participating traffic by " -"default.\n" -"If you do this and your application gets hugely popular, it could break " -"the network." +"We strongly discourage you from disabling participating traffic by default.\n" +"If you do this and your application gets hugely popular, it could break the network." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:90 @@ -4356,12 +3973,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:91 msgid "" -"You must save the router's data (netdb, configuration, etc.) between runs" -" of the router.\n" -"I2P does not work well if you must reseed each startup, and that's a huge" -" load on our reseed servers, and not very good for anonymity either.\n" -"Even if you bundle router infos, I2P needs saved profile data for best " -"performance." +"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n" +"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n" +"Even if you bundle router infos, I2P needs saved profile data for best performance." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:99 @@ -4370,12 +3984,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:100 msgid "" -"Give your users a way to change the configuration of the important " -"settings.\n" -"We understand that you will probably want to hide most of I2P's " -"complexity, but it's important to show some basic settings.\n" -"In addition to the defaults above, some network settings such as UPnP, " -"IP/port may be helpful." +"Give your users a way to change the configuration of the important settings.\n" +"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n" +"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:108 @@ -4384,12 +3995,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:109 msgid "" -"Above a certain bandwidth setting, and meeting other health criteria, " -"your router will become floodfill,\n" -"which may cause a large increase in connections and memory usage (at " -"least with the Java router).\n" -"Think about whether that's OK. You can disable floodfill, but then your " -"fastest users aren't contributing what they could.\n" +"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n" +"which may cause a large increase in connections and memory usage (at least with the Java router).\n" +"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n" "It also depends on the typical uptime for your application." msgstr "" @@ -4400,8 +4008,7 @@ msgstr "اعادة التوزيع" #: i2p2www/pages/site/docs/applications/embedding.html:120 msgid "" "Decide if you are bundling router infos or using our reseed hosts.\n" -"The Java reseed host list is in the source code, so if you keep your " -"source up to date, the host list will be also.\n" +"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n" "Be aware of possible blocking by hostile governments." msgstr "" @@ -4411,12 +4018,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:130 msgid "" -"Consider setting your application tunnels to delay-open, reduce-on-idle " -"and/or close-on-idle.\n" -"This is straightforward if using i2ptunnel but you'll have to implement " -"some of it yourself if using I2CP directly.\n" -"See i2psnark for code that reduces tunnel count and then closes the " -"tunnel, even in the presence of some background DHT activity." +"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n" +"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n" +"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:138 @@ -4425,16 +4029,11 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:139 msgid "" -"Have an auto-update feature if at all possible, or at least auto-" -"notification of a new version.\n" -"Our biggest fear is a huge number of routers out there that can't be " -"updated.\n" -"We have about 6-8 releases a year of the Java router, and it's critical " -"to the health of the network that the users keep up.\n" -"We usually have over 80% of the network on the latest release within " -"6 weeks after the release, and we'd like to keep it that way.\n" -"You don't need to worry about disabling the router's built-in auto-update" -" function, as that code is in the router console,\n" +"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n" +"Our biggest fear is a huge number of routers out there that can't be updated.\n" +"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n" +"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n" +"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n" "which you presumably are not bundling." msgstr "" @@ -4445,17 +4044,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:151 msgid "" "Have a gradual rollout plan. Don't overwhelm the network all at once.\n" -"We currently have approximately 25K unique users per day and 40K uniques " -"per month.\n" -"We are probably able to handle growth of 2-3X per year without too much " -"issue.\n" -"If you anticipate a faster rampup than that, OR the bandwidth " -"distribution (or uptime distribution,\n" -"or any other significant characteristic) of your userbase is " -"significantly different from our current userbase,\n" +"We currently have approximately 25K unique users per day and 40K uniques per month.\n" +"We are probably able to handle growth of 2-3X per year without too much issue.\n" +"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n" +"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n" "we really need to have a discussion.\n" -"The bigger your growth plans, the more important everthing else in this " -"checklist is." +"The bigger your growth plans, the more important everthing else in this checklist is." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:163 @@ -4465,10 +4059,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:164 msgid "" "Tell your users that I2P works best if it keeps running.\n" -"It may be several minutes after startup before it works well, and even " -"more after first install.\n" -"If your average uptime is less than an hour, I2P is probably the wrong " -"solution." +"It may be several minutes after startup before it works well, and even more after first install.\n" +"If your average uptime is less than an hour, I2P is probably the wrong solution." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:172 @@ -4477,8 +4069,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:173 msgid "" -"Provide some indication to the user that the application tunnels are " -"ready. Encourage patience." +"Provide some indication to the user that the application tunnels are ready. " +"Encourage patience." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:178 @@ -4488,8 +4080,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:179 msgid "" "If possible, delay the shutdown until your participating tunnels expire.\n" -"Don't let your users break tunnels easily, or at least ask them to " -"confirm." +"Don't let your users break tunnels easily, or at least ask them to confirm." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:185 @@ -4498,8 +4089,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:186 msgid "" -"It would be nice if you give your users links to learn more about I2P and" -" to donate." +"It would be nice if you give your users links to learn more about I2P and to" +" donate." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:192 @@ -4509,8 +4100,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:193 msgid "" "Depending on your user base and application,\n" -"it may be helpful to provide an option or a separate package to use an " -"external router." +"it may be helpful to provide an option or a separate package to use an external router." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:200 @@ -4519,8 +4109,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:201 msgid "" -"If you plan to use or link to other common I2P services (news feeds, " -"hosts.txt subscriptions, trackers, outproxies, etc.),\n" +"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n" "make sure you aren't overloading them,\n" "and talk to the people who are running them to make sure it's ok." msgstr "" @@ -4532,10 +4121,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:210 msgid "" "I2P includes an SNTP client. I2P requires correct time to operate.\n" -"It will compensate for a skewed system clock but this may delay startup. " -"You may disable I2P's SNTP queries,\n" -"but this isn't advised unless your application makes sure the system " -"clock is correct." +"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n" +"but this isn't advised unless your application makes sure the system clock is correct." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:218 @@ -4544,41 +4131,30 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:219 msgid "" -"At a minimum you will need i2p.jar, router.jar, streaming.jar, and " -"mstreaming.jar.\n" +"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n" "You may omit the two streaming jars for a datagram-only app.\n" "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n" -"Don't forget jbigi.jar, or a subset of it for the platforms you support, " -"to make the crypto much faster.\n" +"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n" "Java 7 or higher is required to build.\n" -"If you're building Debian / Ubuntu packages, you should require the I2P " -"package from our PPA instead of bundling it.\n" -"You almost certainly do not need susimail, susidns, the router console, " -"and i2psnark, for example." +"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n" +"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:228 msgid "" -"The following files should be included in the I2P installation directory," -" specified with the \"i2p.dir.base\" property.\n" -"Don't forget the certificates/ directory, which is required for " -"reseeding, and blocklist.txt for IP validation.\n" -"The geoip directory is optional, but recommended so the router can make " -"decisions based on location.\n" -"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that" -" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)." -"\n" -"The hosts.txt file may be necessary, you may modify it to include any " -"hosts your application uses.\n" -"You may add a router.config file to the base directory to override " -"initial defaults.\n" +"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n" +"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n" +"The geoip directory is optional, but recommended so the router can make decisions based on location.\n" +"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n" +"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n" +"You may add a router.config file to the base directory to override initial defaults.\n" "Review and edit or remove the clients.config and i2ptunnel.config files." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:237 msgid "" -"License requirements may require you to include the LICENSES.txt file and" -" the licenses directory." +"License requirements may require you to include the LICENSES.txt file and " +"the licenses directory." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:243 @@ -4596,17 +4172,14 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:255 msgid "" "Our Android router app may be shared by multiple clients.\n" -"If it is not installed, the user will be prompted when he starts a client" -" app." +"If it is not installed, the user will be prompted when he starts a client app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:259 msgid "" -"Some developers have expressed concern that this is a poor user " -"experience,\n" +"Some developers have expressed concern that this is a poor user experience,\n" "and they wish to embed the router in their app.\n" -"We do have an Android router service library on our roadmap, which could " -"make embedding easier.\n" +"We do have an Android router service library on our roadmap, which could make embedding easier.\n" "More information needed." msgstr "" @@ -4621,11 +4194,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:272 msgid "" -"We have a limited number of our jars on Maven" -" Central.\n" -"There are numerous trac tickets for us to address that will improve and " -"expand the released jars on Maven Central." +"We have a limited number of our jars on Maven Central.\n" +"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:282 @@ -4635,17 +4205,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:283 msgid "" "If your application is using I2P datagrams, e.g. for a DHT,\n" -"there's lots of advanced options available to reduce overhead and " -"increase reliability.\n" +"there's lots of advanced options available to reduce overhead and increase reliability.\n" "This may take some time and experimentation to get working well.\n" "Be aware of size/reliability tradeoffs. Talk to us for help.\n" -"It is possible - and recommended - to use Datagrams and Streaming on the " -"same Destination.\n" +"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n" "Don't create separate Destinations for this.\n" -"Don't try to store your unrelated data in the existing network DHTs " -"(iMule, bote, bittorrent, and router).\n" -"Build your own. If you are hardcoding seed nodes, we recommend that you " -"have several." +"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n" +"Build your own. If you are hardcoding seed nodes, we recommend that you have several." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:296 @@ -4655,8 +4221,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:297 msgid "" "Let's work together. Don't wait until it's done.\n" -"Give us your Twitter handle and start tweeting about it, we will return " -"the favor." +"Give us your Twitter handle and start tweeting about it, we will return the favor." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:303 @@ -4675,8 +4240,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:311 msgid "" -"This may be obvious, but join the community. Run I2P 24/7. Start an I2P " -"Site about your project.\n" +"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n" "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n" "We can help get you users, testers, translators, or even coders." msgstr "" @@ -4687,12 +4251,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:320 msgid "" -"You may wish to install and play with the I2P Android app, and look at " -"its code, for an example of an application that bundles the router.\n" +"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n" "See what we expose to the user and what we hide.\n" "Look at the state machine we use to start and stop the router.\n" -"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak," -" and Monero." +"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:328 @@ -4707,10 +4269,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:359 msgid "" -"This code is for the case where your application starts the router, as in" -" our Android app.\n" -"You could also have the router start the application via the " -"clients.config and i2ptunnel.config files,\n" +"This code is for the case where your application starts the router, as in our Android app.\n" +"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n" "together with Jetty webapps,\n" "as is done in our Java packages.\n" "As always, state management is the difficult part." @@ -4728,13 +4288,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:7 msgid "" -"Cloning large software repositories over I2P can be difficult, and using " -"git can sometimes make this harder. Fortunately, it can also sometimes " -"make it easier. Git has a git bundle command which can be " -"used to turn a git repository into a file which git can then clone, " -"fetch, or import from a location on your local disk. By combining this " -"capability with bittorrent downloads, we can solve our remaining problems" -" with git clone." +"Cloning large software repositories over I2P can be difficult, and using git" +" can sometimes make this harder. Fortunately, it can also sometimes make it " +"easier. Git has a git bundle command which can be used to turn " +"a git repository into a file which git can then clone, fetch, or import from" +" a location on your local disk. By combining this capability with bittorrent" +" downloads, we can solve our remaining problems with git clone." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:8 @@ -4743,13 +4302,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:9 msgid "" -"If you intend to generate a git bundle, you must already" -" possess a full copy of the git repository, not the mtn " -"repository. You can get it from github or from git.idk.i2p, but a shallow" -" clone(a clone done to –depth=1) will not work. It will" -" fail silently, creating what looks like a bundle, but when you try to " -"clone it it will fail. If you are just retrieving a pre-generated git " -"bundle, then this section does not apply to you." +"If you intend to generate a git bundle, you must already " +"possess a full copy of the git repository, not the mtn " +"repository. You can get it from github or from git.idk.i2p, but a shallow " +"clone(a clone done to –depth=1) will not work. It will " +"fail silently, creating what looks like a bundle, but when you try to clone " +"it it will fail. If you are just retrieving a pre-generated git bundle, then" +" this section does not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:10 @@ -4759,23 +4318,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:11 msgid "" "Someone will need to supply you with a torrent file or a magnet link " -"corresponding to an existing git bundle that they have " -"already generated for you. A recent, correctly-generated bundle of the " -"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be " -"found inside of I2P at my pastebin git bundle that they have already " +"generated for you. A recent, correctly-generated bundle of the mainline " +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of " +"I2P at my pastebin paste.idk.i2p/f/4hq37i." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:12 msgid "" "Once you have a bundle, you will need to use git to create a working " -"repository from it. If you’re using GNU/Linux and i2psnark, the git " -"bundle should be located in $HOME/.i2p/i2psnark or, as a service on " -"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on " -"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/” instead. The " -"examples here assume I2PSnark on GNU/Linux, if you use something else, " -"replace the path to the bundle with the download directory preferred by " -"your client and platform." +"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle " +"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, " +"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it " +"is probably at “$HOME/BiglyBT Downloads/” instead. The examples here assume " +"I2PSnark on GNU/Linux, if you use something else, replace the path to the " +"bundle with the download directory preferred by your client and platform." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:13 @@ -4788,8 +4346,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:16 msgid "" -"If you get the following error, try using git init and git fetch manually" -" instead." +"If you get the following error, try using git init and git fetch manually " +"instead." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:18 @@ -4824,10 +4382,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:29 msgid "" -"First, follow the Git guide for Users until you " -"have a successfully --unshallowed clone of clone of the " -"i2p.i2p repository. If you already have a clone, make sure you run " -"git fetch --unshallow before you generate a torrent bundle." +"First, follow the Git guide for Users until you have " +"a successfully --unshallowed clone of clone of the i2p.i2p " +"repository. If you already have a clone, make sure you run git fetch " +"--unshallow before you generate a torrent bundle." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:30 @@ -4836,8 +4394,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:32 msgid "" -"and copy the resulting bundle into your I2PSnark downloads directory. For" -" instance:" +"and copy the resulting bundle into your I2PSnark downloads directory. For " +"instance:" msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:34 @@ -4848,14 +4406,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:7 msgid "" -"Tutorial for setting up git access through an I2P Tunnel. This tunnel " -"will act as your access point to a single git service on I2P." +"Tutorial for setting up git access through an I2P Tunnel. This tunnel will " +"act as your access point to a single git service on I2P." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:8 msgid "" -"If you intend to use the service at i2pgit.org/git.idk.i2p, then you " -"probably already have a tunnel configured and much of this\n" +"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n" "tutorial will not apply to you." msgstr "" @@ -4866,22 +4423,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:11 msgid "" "To create your repositories on a remote git service, sign up for a user " -"account at that service. Of course it’s also possible to create " -"repositories locally and push them to a remote git service, but most will" -" require an account and for you to create a space for the repository on " -"the server. Gitlab has a very simple sign-up form:" +"account at that service. Of course it’s also possible to create repositories" +" locally and push them to a remote git service, but most will require an " +"account and for you to create a space for the repository on the server. " +"Gitlab has a very simple sign-up form:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:12 msgid "" -"These are generic instructions for any in-i2p Git instance with HTTP and " -"SSH gateways.\n" -"If you intend to contribute to I2P, you should create an account at the " -"I2P gitlab, which is open to the\n" -"community. Account registration may take a few days to complete, as the " -"admin needs to sort through a large\n" -"number of spam registrations. You can help this by getting in touch with " -"the admin to confirm you are human\n" +"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n" +"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n" +"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n" +"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n" "using the instructions on the home page." msgstr "" @@ -4895,10 +4448,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:27 msgid "" -"To make sure the setup process works, it helps to make a repository to " -"test with from the server, and for the sake of this tutorial, we’re going" -" to use a fork of the I2P router. First, browse to the i2p-" -"hackers/i2p.i2p repository:" +"To make sure the setup process works, it helps to make a repository to test " +"with from the server, and for the sake of this tutorial, we’re going to use " +"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p " +"repository:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:34 @@ -4907,20 +4460,20 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:42 msgid "" -"To have read-write access to my server, you’ll need to set up a tunnel " -"for your SSH client. As an example, we’re going to use the HTTP tunnel " -"instead, but if all you need is read-only, HTTP/S cloning, then you can " -"skip all this and just use the http_proxy environment variable to " -"configure git to use the pre-configured I2P HTTP Proxy. For example:" +"To have read-write access to my server, you’ll need to set up a tunnel for " +"your SSH client. As an example, we’re going to use the HTTP tunnel instead, " +"but if all you need is read-only, HTTP/S cloning, then you can skip all this" +" and just use the http_proxy environment variable to configure git to use " +"the pre-configured I2P HTTP Proxy. For example:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:50 msgid "" -"Then, add the address you will be pushing and pulling from. Note that " -"this example address is for Read-Only HTTP-over-I2P clones, if your admin" -" does not allow the git HTTP(Smart HTTP) protocol, then you will need to " -"get the SSH clone base32 from them. If you have an SSH clone base32, " -"substitute it for the base32 in this step, which will fail." +"Then, add the address you will be pushing and pulling from. Note that this " +"example address is for Read-Only HTTP-over-I2P clones, if your admin does " +"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the " +"SSH clone base32 from them. If you have an SSH clone base32, substitute it " +"for the base32 in this step, which will fail." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:54 @@ -4948,8 +4501,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:68 msgid "" "Git Privacy: Committing to git adds a timestamp to git commit messages, " -"which may be configured to reflect your local time zone. To enforce the " -"use of UTC for all commits, you are advised to use a git alias, such as:" +"which may be configured to reflect your local time zone. To enforce the use " +"of UTC for all commits, you are advised to use a git alias, such as:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:70 @@ -4967,33 +4520,33 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:78 msgid "" "You might get an error where the remote end hangs up unexpectedly. " -"Unfortunately git still doesn’t support resumable cloning. Until it does," -" there are a couple fairly easy ways to handle this. The first and " -"easiest is to try and clone to a shallow depth:" +"Unfortunately git still doesn’t support resumable cloning. Until it does, " +"there are a couple fairly easy ways to handle this. The first and easiest is" +" to try and clone to a shallow depth:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:81 msgid "" -"Once you’ve performed a shallow clone, you can fetch the rest resumably " -"by changing to the repo directory and running:" +"Once you’ve performed a shallow clone, you can fetch the rest resumably by " +"changing to the repo directory and running:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:83 msgid "" -"At this point, you still don’t have all your branches yet. You can get " -"them by running the following commands:" +"At this point, you still don’t have all your branches yet. You can get them " +"by running the following commands:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:86 msgid "" -"Which tells git to alter the repository configuration so that fetching " -"from origin fetches all branches." +"Which tells git to alter the repository configuration so that fetching from " +"origin fetches all branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:87 msgid "" -"If that doesn’t work, you can try opening the tunnel configuration menu " -"and adding some backup tunnels." +"If that doesn’t work, you can try opening the tunnel configuration menu and " +"adding some backup tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:91 @@ -5011,26 +4564,26 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:96 msgid "" -"Revision control can make your life easier, but it works best if you use " -"it well! In light of this, we strongly suggest a fork-first, feature-" -"branch workflow as many are familiar with from Github. In such a " -"workflow, the master branch is used as a sort of “Trunk” for updates and " -"is never touched by the programmmer, instead, all changes to the master " -"are merged from branches. In order to do set up your workspace for this, " -"take the following steps:" +"Revision control can make your life easier, but it works best if you use it " +"well! In light of this, we strongly suggest a fork-first, feature-branch " +"workflow as many are familiar with from Github. In such a workflow, the " +"master branch is used as a sort of “Trunk” for updates and is never touched " +"by the programmmer, instead, all changes to the master are merged from " +"branches. In order to do set up your workspace for this, take the following " +"steps:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:98 msgid "" -"Never make changes to the Master Branch. You will be " -"using the master branch to periodially obtain updates to the official " -"source code. All changes should be made in feature branches." +"Never make changes to the Master Branch. You will be using " +"the master branch to periodially obtain updates to the official source code." +" All changes should be made in feature branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:101 msgid "" -"Set up a second remote in your local repository using the upstream source" -" code." +"Set up a second remote in your local repository using the upstream source " +"code." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:103 @@ -5039,33 +4592,31 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:105 msgid "" -"Before making any changes to the source code, check out a new feature " -"branch to develop on:" +"Before making any changes to the source code, check out a new feature branch" +" to develop on:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:107 msgid "" -"When you’re done with your changes, commit them and push them to your " -"branch" +"When you’re done with your changes, commit them and push them to your branch" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:110 msgid "" -"Submit a merge request. When the merge request is approved and brought " -"into the upstream master, check out the master locally and pull in the " -"changes:" +"Submit a merge request. When the merge request is approved and brought into " +"the upstream master, check out the master locally and pull in the changes:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:113 msgid "" -"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, " -"you can update your master code using this procedure as well." +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you " +"can update your master code using this procedure as well." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:117 msgid "" -"The git utccommit alias solution to git timestamp issue was arrived at " -"from the information first published here" +"The git utccommit alias solution to git timestamp issue was arrived at from " +"the information first published here" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:6 @@ -5074,22 +4625,21 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:7 msgid "" -"Mirror I2P Git repositories and Bridge Non-private internet.repositories " -"for others." +"Mirror I2P Git repositories and Bridge Non-private internet.repositories for" +" others." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:10 msgid "" -"This is the setup process I use for configuring Gitlab and I2P, with " -"Docker in place to manage the service itself. Gitlab is very easy to host" -" on I2P in this fashion, it can be administered by one person without " -"much difficulty. In my configuration, I use a Debian VM to host docker " -"containers and an I2P router, on a Debian Host system, however, this may " -"be more than necessary for some people. These instructions should work on" -" any Debian-based system, regardless of whether it is in a VM or not, and" -" should easily translate to any system where Docker and an I2P router are" -" available. This guide starts at Docker and does not assume any VM " -"underneath." +"This is the setup process I use for configuring Gitlab and I2P, with Docker " +"in place to manage the service itself. Gitlab is very easy to host on I2P in" +" this fashion, it can be administered by one person without much difficulty." +" In my configuration, I use a Debian VM to host docker containers and an I2P" +" router, on a Debian Host system, however, this may be more than necessary " +"for some people. These instructions should work on any Debian-based system, " +"regardless of whether it is in a VM or not, and should easily translate to " +"any system where Docker and an I2P router are available. This guide starts " +"at Docker and does not assume any VM underneath." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:11 @@ -5098,15 +4648,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:12 msgid "" -"Because Gitlab runs in a container, we only need to install the " -"dependencies required for the container on our main system. Conveniently," -" you can install everything you need with:" +"Because Gitlab runs in a container, we only need to install the dependencies" +" required for the container on our main system. Conveniently, you can " +"install everything you need with:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:14 msgid "" -"on an otherwise unmodified Debian system, or if you have added Docker’s " -"own “Community” Debian repository, you may use:" +"on an otherwise unmodified Debian system, or if you have added Docker’s own " +"“Community” Debian repository, you may use:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:16 @@ -5119,62 +4669,61 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:18 msgid "" -"Once you have docker installed, you can fetch the docker containers " -"required for gitlab. Don’t run them yet." +"Once you have docker installed, you can fetch the docker containers required" +" for gitlab. Don’t run them yet." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:20 msgid "" -"For those who are concerned, the gitlab-ce Docker image is built using " -"only Ubuntu Docker images as a parent, which are built from scratch " -"images. Since there are no third-party images involved here, updates " -"should come as soon as they are available in the host images. To review " -"the Dockerfile for yourself, visit the Gitlab " -"source code." +"For those who are concerned, the gitlab-ce Docker image is built using only " +"Ubuntu Docker images as a parent, which are built from scratch images. Since" +" there are no third-party images involved here, updates should come as soon " +"as they are available in the host images. To review the Dockerfile for " +"yourself, visit the Gitlab source code." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:21 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:22 msgid "" "Gitlab servers inside of I2P can be run with or without the ability to " -"interact with servers on the internet outside of I2P. In the case where " -"the Gitlab server is not allowed to interact with servers " -"outside of I2P, they cannot be de-anonymized by cloning a git repository " -"from a git server on the internet outside of I2P. They can, however, " -"export and mirror repositories from other git services inside of I2P." +"interact with servers on the internet outside of I2P. In the case where the " +"Gitlab server is not allowed to interact with servers outside of " +"I2P, they cannot be de-anonymized by cloning a git repository from a git " +"server on the internet outside of I2P. They can, however, export and mirror " +"repositories from other git services inside of I2P." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:23 msgid "" "In the case where the Gitlab server is allowed to interact with " -"servers outside of I2P, it can act as a “Bridge” for the users, who can " -"use it to mirror content outside I2P to an I2P-accessible source, however" -" it is not anonymous in this case. Git services on the non-" -"anonymous internet will be connected to directly." +"servers outside of I2P, it can act as a “Bridge” for the users, who can use " +"it to mirror content outside I2P to an I2P-accessible source, however it " +"is not anonymous in this case. Git services on the non-anonymous " +"internet will be connected to directly." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:24 msgid "" -"If you want to have a bridged, non-anonymous Gitlab instance with" -" access to web repositories, no further " +"If you want to have a bridged, non-anonymous Gitlab instance with " +"access to web repositories, no further " "modification is necessary." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:25 msgid "" -"If you want to have an I2P-Only Gitlab instance with no access to" -" Web-Only Repositories, you will need to " -"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP " -"proxy only listens on 127.0.0.1, you will need to set up a " -"new one for Docker that listens on the Host/Gateway address of the Docker" -" network, which is usually 172.17.0.1. I configure mine on " -"port 4446." +"If you want to have an I2P-Only Gitlab instance with no access to " +"Web-Only Repositories, you will need to configure " +"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only " +"listens on 127.0.0.1, you will need to set up a new one for " +"Docker that listens on the Host/Gateway address of the Docker network, which" +" is usually 172.17.0.1. I configure mine on port " +"4446." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:26 @@ -5190,8 +4739,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:37 msgid "" "Visit your Local Gitlab instance and set up your admin account. Choose a " -"strong password, and configure user account limits to match your " -"resources." +"strong password, and configure user account limits to match your resources." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:38 @@ -5202,21 +4750,19 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:39 msgid "" -"It’s also possible to apply your HTTP Proxy settings in a more granular " -"way, so that you can only allow users to mirror repositories from the " -"domains that you choose. Since the domain is presumably operated by an " -"organization, you can use this to ensure that repositories that are " -"mirrorable follow a reasonable set of policies. After all, there is far " -"more abusive content on the non-anonymous internet than there is on I2P, " -"we wouldn’t want to make it too easy to introduce abusive content from " -"such a nefarious place." +"It’s also possible to apply your HTTP Proxy settings in a more granular way," +" so that you can only allow users to mirror repositories from the domains " +"that you choose. Since the domain is presumably operated by an organization," +" you can use this to ensure that repositories that are mirrorable follow a " +"reasonable set of policies. After all, there is far more abusive content on " +"the non-anonymous internet than there is on I2P, we wouldn’t want to make it" +" too easy to introduce abusive content from such a nefarious place." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:40 msgid "" -"Add the following lines to your gitlab.rb file inside the " -"/src/gitlab/config container. These settings will take effect when you " -"restart in a moment." +"Add the following lines to your gitlab.rb file inside the /src/gitlab/config" +" container. These settings will take effect when you restart in a moment." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:56 @@ -5225,10 +4771,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:57 msgid "" -"Once you have Gitlab set up locally, go to the I2P Router console. You " -"will need to set up two server tunnels, one leading to the Gitlab " -"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface" -" on TCP Port 8022." +"Once you have Gitlab set up locally, go to the I2P Router console. You will " +"need to set up two server tunnels, one leading to the Gitlab web(HTTP) " +"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port " +"8022." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:58 @@ -5239,8 +4785,7 @@ msgstr "" msgid "" "For the Web interface, use an “HTTP” server tunnel. From http://127.0.0.1:7657/i2ptunnelmgr" -" launch the “New Tunnel Wizard” and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard” and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:61 @@ -5258,8 +4803,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:64 msgid "" -"Fill in 127.0.0.1 for the host and 8080 for the" -" port." +"Fill in 127.0.0.1 for the host and 8080 for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:65 @@ -5278,19 +4823,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:69 msgid "" -"Web services on I2P can register hostnames for themselves by providing an" -" authentication string to a jump service provider like stats.i2p. To do this, open the http://127.0.0.1:7657/i2ptunnelmgr" -" again and click on the “Gitlab Web Service” item you just set up. Scroll" -" to the bottom of the “Edit Server Settings” section and click " -"Registration Authentication. Copy the field that says “Authentication for" -" adding Hostname” and visit stats.i2p to add your " -"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then" -" you will have to use the correct authentication string for your " -"subdomain, which is a little bit more complicated and merits it’s own " -"instructions." +"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then " +"you will have to use the correct authentication string for your subdomain, " +"which is a little bit more complicated and merits it’s own instructions." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:70 @@ -5301,8 +4845,7 @@ msgstr "" msgid "" "For the SSH interface, use a “Standard” server tunnel. From http://127.0.0.1:7657/i2ptunnelmgr" -" launch the “New Tunnel Wizard” and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard” and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:74 @@ -5315,8 +4858,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:76 msgid "" -"Fill in 127.0.0.1 for the host and 8022 for the" -" port." +"Fill in 127.0.0.1 for the host and 8022 for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:80 @@ -5325,9 +4868,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:81 msgid "" -"Finally, if you either modified gitlab.rb or you registered " -"a hostname, you will need to re-start the gitlab service for the settings" -" to take effect." +"Finally, if you either modified gitlab.rb or you registered a " +"hostname, you will need to re-start the gitlab service for the settings to " +"take effect." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:2 @@ -5345,20 +4888,16 @@ msgstr "مستخدم" #: i2p2www/pages/site/docs/applications/irc.html:15 msgid "" " There are many IRC clients that can be used with I2P. In\n" -"fact, all IRC clients can be connected to the Irc2P Service by connecting" -"\n" +"fact, all IRC clients can be connected to the Irc2P Service by connecting\n" "them to the IRC Tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:28 msgid "" "To configure any IRC client to chat on Irc2P, first, make sure that\n" -"your IRC tunnel is available. Visit the Hidden Services Manager\n" -"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" " -"indicator on\n" -"the right-hand side is yellow or green, your Irc2P tunnel is ready and " -"you should \n" +"your IRC tunnel is available. Visit the Hidden Services Manager\n" +"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n" +"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n" "proceed to the next step." msgstr "" @@ -5375,12 +4914,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:42 msgid "" "Pidgin is a very popular Instant Messaging client with built-in IRC\n" -"support. It is also possible to use it with many other kinds of chat " -"service, and\n" -"it supports using multiple accounts at once and has a variety of plugin-" -"ins. There\n" -"is a similar application for OSX called \"Adium.\" The instructions for " -"Pidgin are\n" +"support. It is also possible to use it with many other kinds of chat service, and\n" +"it supports using multiple accounts at once and has a variety of plugin-ins. There\n" +"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n" "similar in Adium.\n" msgstr "" @@ -5396,8 +4932,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:52 msgid "" "After launching Pidgin, you should see a \"Buddy List\" window. From\n" -"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage" -" Accounts\" to\n" +"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n" "begin configuring your I2P account." msgstr "" @@ -5412,10 +4947,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:59 msgid "" "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n" -"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and" -" password. IRC\n" -"does not require you to register a nickname to join, but you may if you " -"wish, after\n" +"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n" +"does not require you to register a nickname to join, but you may if you wish, after\n" "you connect to Irc2P." msgstr "" @@ -5430,8 +4963,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:67 msgid "" "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n" -"make sure that SSL is disabled, since your tunnel has encryption" -" provided\n" +"make sure that SSL is disabled, since your tunnel has encryption provided\n" "by I2P." msgstr "" @@ -5475,8 +5007,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:87 msgid "" "Change the value in \"Servers\" from the default to `localhost/6669`,\n" -"and configure the default channels you want to join. I suggest #i2p and " -"#i2p-dev\n" +"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n" msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:92 @@ -5576,8 +5107,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:143 msgid "" "Revolution IRC is an easy to use IRC client for Android. It's able to\n" -"handle multiple accounts on multiple services, so you can use it for " -"Irc2P and for\n" +"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n" "your non-I2P IRC networks as well." msgstr "" @@ -5638,15 +5168,13 @@ msgstr "الخوادم" #: i2p2www/pages/site/docs/applications/irc.html:196 msgid "" "Eris is an easy-to-configure IRC server with self-configuring support\n" -"for I2P. If you want to run a private IRC server it's one of the easiest " -"ways." +"for I2P. If you want to run a private IRC server it's one of the easiest ways." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:199 msgid "" " This is a valid configuration of the Eris IRC server, but it uses a\n" -"default password for the admin account(admin). You should change the " -"operator.admin.password\n" +"default password for the admin account(admin). You should change the operator.admin.password\n" "and account.admin.password before deploying to a real service." msgstr "" @@ -5671,24 +5199,18 @@ msgstr "" msgid "" "As of release 0.9.4, the router supports managed clients.\n" "Managed clients are instantiated and started by the ClientAppManager.\n" -"The ClientAppManager maintains a reference to the client and receives " -"updates on the client's state.\n" -"Managed clients are preferred, as it is much easier to implement state " -"tracking\n" -"and to start and stop a client. It also is much easier to avoid static " -"references in the client code\n" +"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n" +"Managed clients are preferred, as it is much easier to implement state tracking\n" +"and to start and stop a client. It also is much easier to avoid static references in the client code\n" "which could lead to excessive memory usage after a client is stopped.\n" -"Managed clients may be started and stopped by the user in the router " -"console,\n" +"Managed clients may be started and stopped by the user in the router console,\n" "and are stopped at router shutdown." msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:31 msgid "" -"Managed clients implement either the net.i2p.app.ClientApp or " -"net.i2p.router.app.RouterApp interface.\n" -"Clients implementing the ClientApp interface must provide the following " -"constructor:" +"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n" +"Clients implementing the ClientApp interface must provide the following constructor:" msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:38 @@ -5707,12 +5229,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:49 msgid "" -"If the main class specified in the clients.config file does not implement" -" a managed interface,\n" +"If the main class specified in the clients.config file does not implement a managed interface,\n" "it will be started with main() with the arguments specified,\n" "and stopped with main() with the arguments specified.\n" -"The router does not maintain a reference, since all interactions are via " -"the static main() method.\n" +"The router does not maintain a reference, since all interactions are via the static main() method.\n" "The console cannot provide accurate state information to the user." msgstr "" @@ -5722,8 +5242,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:58 msgid "" -"Clients, whether managed or unmanaged, may register with the " -"ClientAppManager\n" +"Clients, whether managed or unmanaged, may register with the ClientAppManager\n" "so that other clients may retrieve a reference to them.\n" "Registration is by name.\n" "Known registered clients are:" @@ -5735,12 +5254,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:69 msgid "" -"The router also provides a simple mechanism for clients to find an " -"internal socket service,\n" +"The router also provides a simple mechanism for clients to find an internal socket service,\n" "such as the HTTP proxy. This is provided by the Port Mapper.\n" "Registration is by name.\n" -"Clients that register generally provide an internal emulated socket on " -"that port." +"Clients that register generally provide an internal emulated socket on that port." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:2 @@ -5750,8 +5267,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:4 #, python-format msgid "" -"NOTE: The following is a discussion of the reasons behind the I2P naming " -"system,\n" +"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n" "common arguments and possible alternatives.\n" "See the naming page for current documentation." msgstr "" @@ -5762,72 +5278,49 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:12 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning " -"with\n" -"advocates across the spectrum of possibilities. However, given I2P's " -"inherent\n" -"demand for secure communication and decentralized operation, the " -"traditional\n" -"DNS-style naming system is clearly out, as are \"majority rules\" voting " -"systems." +"Naming within I2P has been an oft-debated topic since the very beginning with\n" +"advocates across the spectrum of possibilities. However, given I2P's inherent\n" +"demand for secure communication and decentralized operation, the traditional\n" +"DNS-style naming system is clearly out, as are \"majority rules\" voting systems." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:19 msgid "" -"I2P does not promote the use of DNS-like services though, as the damage " -"done\n" -"by hijacking a site can be tremendous - and insecure destinations have no" -"\n" -"value. DNSsec itself still falls back on registrars and certificate " -"authorities,\n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the reply\n" -"spoofed, as they are encrypted to the destination's public keys, and a " -"destination\n" -"itself is just a pair of public keys and a certificate. DNS-style " -"systems on the\n" -"other hand allow any of the name servers on the lookup path to mount " -"simple denial\n" -"of service and spoofing attacks. Adding on a certificate authenticating " -"the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"I2P does not promote the use of DNS-like services though, as the damage done\n" +"by hijacking a site can be tremendous - and insecure destinations have no\n" +"value. DNSsec itself still falls back on registrars and certificate authorities,\n" +"while with I2P, requests sent to a destination cannot be intercepted or the reply\n" +"spoofed, as they are encrypted to the destination's public keys, and a destination\n" +"itself is just a pair of public keys and a certificate. DNS-style systems on the\n" +"other hand allow any of the name servers on the lookup path to mount simple denial\n" +"of service and spoofing attacks. Adding on a certificate authenticating the\n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:33 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness of\n" -"Sybil attacks in anonymous systems - the attacker can simply create an " -"arbitrarily\n" -"high number of peers and \"vote\" with each to take over a given name. " -"Proof-of-work\n" -"methods can be used to make identity non-free, but as the network grows " -"the load\n" -"required to contact everyone to conduct online voting is implausible, or " -"if the\n" +"Voting style naming is dangerous as well, especially given the effectiveness of\n" +"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n" +"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n" +"methods can be used to make identity non-free, but as the network grows the load\n" +"required to contact everyone to conduct online voting is implausible, or if the\n" "full network is not queried, different sets of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:42 msgid "" -"As with the Internet however, I2P is keeping the design and operation of " -"a \n" -"naming system out of the (IP-like) communication layer. The bundled " -"naming library\n" -"includes a simple service provider interface which alternate naming systems can\n" -"plug into, allowing end users to drive what sort of naming tradeoffs they" -" prefer." +"As with the Internet however, I2P is keeping the design and operation of a \n" +"naming system out of the (IP-like) communication layer. The bundled naming library\n" +"includes a simple service provider interface which alternate naming systems can\n" +"plug into, allowing end users to drive what sort of naming tradeoffs they prefer." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:50 msgid "" -"See also Names: " -"Decentralized, Secure, Human-Meaningful: Choose Two." +"See also Names: Decentralized, " +"Secure, Human-Meaningful: Choose Two." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:55 @@ -5838,36 +5331,26 @@ msgstr "" msgid "" "Q:\n" "What to do if some hosts \n" -"do not agree on one address and if some addresses are working, others are" -" not? \n" +"do not agree on one address and if some addresses are working, others are not? \n" "Who is the right source of a name?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:64 msgid "" "A:\n" -"You don't. This is actually a critical difference between names on I2P " -"and how \n" -"DNS works - names in I2P are human readable, secure, but not globally" -" \n" -"unique. This is by design, and an inherent part of our need for " -"security." +"You don't. This is actually a critical difference between names on I2P and how \n" +"DNS works - names in I2P are human readable, secure, but not globally \n" +"unique. This is by design, and an inherent part of our need for security." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:70 msgid "" -"If I could somehow convince you to change the destination associated with" -" some \n" -"name, I'd successfully \"take over\" the site, and under no circumstances" -" is that \n" -"acceptable. Instead, what we do is make names locally unique: " -"they are \n" -"what you use to call a site, just as how you can call things " -"whatever \n" -"you want when you add them to your browser's bookmarks, or your IM " -"client's \n" -"buddy list. Who you call \"Boss\" may be who someone else calls " -"\"Sally\"." +"If I could somehow convince you to change the destination associated with some \n" +"name, I'd successfully \"take over\" the site, and under no circumstances is that \n" +"acceptable. Instead, what we do is make names locally unique: they are \n" +"what you use to call a site, just as how you can call things whatever \n" +"you want when you add them to your browser's bookmarks, or your IM client's \n" +"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:78 @@ -5883,44 +5366,33 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:89 msgid "" "Inefficiency:\n" -"The whole hosts.txt is downloaded (if it has changed, since eepget uses " -"the etag and last-modified headers).\n" +"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n" "It's about 400K right now for almost 800 hosts." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:94 msgid "" -"True, but this isn't a lot of traffic in the context of i2p, which is " -"itself wildly inefficient\n" -"(floodfill databases, huge encryption overhead and padding, garlic " -"routing, etc.).\n" -"If you downloaded a hosts.txt file from someone every 12 hours it " -"averages out to about 10 bytes/sec." +"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n" +"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n" +"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:99 msgid "" -"As is usually the case in i2p, there is a fundamental tradeoff here " -"between anonymity and efficiency.\n" -"Some would say that using the etag and last-modified headers is hazardous" -" because it exposes when you\n" +"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n" +"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n" "last requested the data.\n" -"Others have suggested asking for specific keys only (similar to what jump" -" services do, but\n" +"Others have suggested asking for specific keys only (similar to what jump services do, but\n" "in a more automated fashion), possibly at a further cost in anonymity." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:106 #, python-format msgid "" -"Possible improvements would be a replacement or supplement to address " -"book (see %(i2host)sp),\n" -"or something simple like subscribing to http://example.i2p/cgi-" -"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" -"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 " -"hours, for example,\n" -"that could be both more efficient and more anonymous than the current " -"hosts.txt with last-modified and etag." +"Possible improvements would be a replacement or supplement to address book (see %(i2host)sp),\n" +"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" +"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n" +"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:112 @@ -5930,17 +5402,14 @@ msgid "" "%(url)s.\n" "This script returns an Etag with a timestamp.\n" "When a request comes in with the If-None-Match etag,\n" -"the script ONLY returns new hosts since that timestamp, or 304 Not " -"Modified if there are none.\n" -"In this way, the script efficiently returns only the hosts the subscriber" -"\n" +"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n" +"In this way, the script efficiently returns only the hosts the subscriber\n" "does not know about, in an address book-compatible manner." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:121 msgid "" -"So the inefficiency is not a big issue and there are several ways to " -"improve things without\n" +"So the inefficiency is not a big issue and there are several ways to improve things without\n" "radical change." msgstr "" @@ -5954,38 +5423,30 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:132 msgid "" "As far as network traffic see above.\n" -"But unless you're going to do a slow real-time query over the network for" -"\n" -"a key, you need to have the whole set of keys stored locally, at a cost " -"of about 500 bytes per key." +"But unless you're going to do a slow real-time query over the network for\n" +"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:139 msgid "" "Requires configuration and \"trust\":\n" -"Out-of-the-box address book is only subscribed to " -"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" +"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" "leading to poor new-user experience." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:144 msgid "" -"This is very much intentional. jrandom wants a user to \"trust\" a " -"hosts.txt\n" +"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n" "provider, and as he likes to say, \"trust is not a boolean\".\n" -"The configuration step attempts to force users to think about issues of " -"trust in an anonymous network." +"The configuration step attempts to force users to think about issues of trust in an anonymous network." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:149 msgid "" -"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy" -"\n" -"lists some jump services, but doesn't \"recommend\" any one in " -"particular,\n" +"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n" +"lists some jump services, but doesn't \"recommend\" any one in particular,\n" "and it's up to the user to pick one (or not).\n" -"jrandom would say we trust the listed providers enough to list them but " -"not enough to\n" +"jrandom would say we trust the listed providers enough to list them but not enough to\n" "automatically go fetch the key from them." msgstr "" @@ -6002,14 +5463,13 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:166 msgid "" -"Unfortunately real-time lookups over i2p would significantly slow down " -"web browsing." +"Unfortunately real-time lookups over i2p would significantly slow down web " +"browsing." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:169 msgid "" -"Also, DNS is based on lookups with limited caching and time-to-live, " -"while i2p\n" +"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n" "keys are permanent." msgstr "" @@ -6028,26 +5488,21 @@ msgid "" "Yes it depends on a few servers that you have configured.\n" "Within i2p, servers and services come and go.\n" "Any other centralized system (for example DNS root servers) would\n" -"have the same problem. A completely decentralized system (everybody is " -"authoritative)\n" -"is possible by implementing an \"everybody is a root DNS server\" " -"solution, or by\n" -"something even simpler, like a script that adds everybody in your " -"hosts.txt to your address book." +"have the same problem. A completely decentralized system (everybody is authoritative)\n" +"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n" +"something even simpler, like a script that adds everybody in your hosts.txt to your address book." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:190 msgid "" -"People advocating all-authoritative solutions generally haven't thought " -"through\n" +"People advocating all-authoritative solutions generally haven't thought through\n" "the issues of conflicts and hijacking, however." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:196 msgid "" "Awkward, not real-time:\n" -"It's a patchwork of hosts.txt providers, key-add web form providers, jump" -" service providers,\n" +"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n" "I2P Site status reporters.\n" "Jump servers and subscriptions are a pain, it should just work like DNS." msgstr "" @@ -6058,8 +5513,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:207 msgid "" -"So, in summary, the current system is not horribly broken, inefficient, " -"or un-scalable,\n" +"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n" "and proposals to \"just use DNS\" aren't well thought-through." msgstr "" @@ -6069,8 +5523,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:213 msgid "" -"The I2P source contains several pluggable naming systems and supports " -"configuration options\n" +"The I2P source contains several pluggable naming systems and supports configuration options\n" "to enable experimentation with naming systems." msgstr "" @@ -6092,8 +5545,8 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:234 msgid "" -"AddressDB - Each host is listed in a separate file in a addressDb/" -" directory." +"AddressDB - Each host is listed in a separate file in a addressDb/ " +"directory." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:237 @@ -6118,8 +5571,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:253 msgid "" -"The current naming system can be changed with the advanced config option " -"'i2p.naming.impl'\n" +"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n" "(restart required).\n" "See core/java/src/net/i2p/client/naming for details." msgstr "" @@ -6127,8 +5579,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:258 msgid "" "Any new system should be stacked with HostsTxt, or should\n" -"implement local storage and/or the address book subscription functions, " -"since address book\n" +"implement local storage and/or the address book subscription functions, since address book\n" "only knows about the hosts.txt files and format." msgstr "" @@ -6138,50 +5589,40 @@ msgstr "الشهادات" #: i2p2www/pages/site/docs/discussions/naming.html:265 msgid "" -"I2P destinations contain a certificate, however at the moment that " -"certificate\n" +"I2P destinations contain a certificate, however at the moment that certificate\n" "is always null.\n" -"With a null certificate, base64 destinations are always 516 bytes ending " -"in \"AAAA\",\n" -"and this is checked in the address book merge mechanism, and possibly " -"other places.\n" -"Also, there is no method available to generate a certificate or add it to" -" a\n" +"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n" +"and this is checked in the address book merge mechanism, and possibly other places.\n" +"Also, there is no method available to generate a certificate or add it to a\n" "destination. So these will have to be updated to implement certificates." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:273 #, python-format msgid "" -"One possible use of certificates is for proof of work." +"One possible use of certificates is for proof " +"of work." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:276 msgid "" -"Another is for \"subdomains\" (in quotes because there is really no such " -"thing,\n" -"i2p uses a flat naming system) to be signed by the 2nd level domain's " -"keys." +"Another is for \"subdomains\" (in quotes because there is really no such thing,\n" +"i2p uses a flat naming system) to be signed by the 2nd level domain's keys." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:280 msgid "" -"With any certificate implementation must come the method for verifying " -"the\n" +"With any certificate implementation must come the method for verifying the\n" "certificates.\n" "Presumably this would happen in the address book merge code.\n" -"Is there a method for multiple types of certificates, or multiple " -"certificates?" +"Is there a method for multiple types of certificates, or multiple certificates?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:286 msgid "" "Adding on a certificate authenticating the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" @@ -6200,91 +5641,58 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:11 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:19 #: i2p2www/pages/site/docs/how/tech-intro.html:508 msgid "" -"The first time a router wants to encrypt a garlic message to another " -"router, \n" -"they encrypt the keying material for an AES256 session key with ElGamal " -"and \n" -"append the AES256/CBC encrypted payload after that encrypted ElGamal " -"block. \n" -"In addition to the encrypted payload, the AES encrypted section contains " -"the \n" -"payload length, the SHA256 hash of the unencrypted payload, as well as a " -"number \n" -"of \"session tags\" - random 32 byte nonces. The next time the sender " -"wants \n" -"to encrypt a garlic message to another router, rather than ElGamal " -"encrypt \n" -"a new session key they simply pick one of the previously delivered " -"session \n" -"tags and AES encrypt the payload like before, using the session key used " -"with \n" -"that session tag, prepended with the session tag itself. When a router " -"receives \n" -"a garlic encrypted message, they check the first 32 bytes to see if it " -"matches \n" -"an available session tag - if it does, they simply AES decrypt the " -"message, \n" +"The first time a router wants to encrypt a garlic message to another router, \n" +"they encrypt the keying material for an AES256 session key with ElGamal and \n" +"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n" +"In addition to the encrypted payload, the AES encrypted section contains the \n" +"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n" +"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n" +"to encrypt a garlic message to another router, rather than ElGamal encrypt \n" +"a new session key they simply pick one of the previously delivered session \n" +"tags and AES encrypt the payload like before, using the session key used with \n" +"that session tag, prepended with the session tag itself. When a router receives \n" +"a garlic encrypted message, they check the first 32 bytes to see if it matches \n" +"an available session tag - if it does, they simply AES decrypt the message, \n" "but if it does not, they ElGamal decrypt the first block." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:35 #: i2p2www/pages/site/docs/how/tech-intro.html:524 msgid "" -"Each session tag can be used only once so as to prevent internal " -"adversaries \n" -"from unnecessarily correlating different messages as being between the " -"same \n" -"routers. The sender of an ElGamal/AES+SessionTag encrypted message " -"chooses \n" -"when and how many tags to deliver, prestocking the recipient with enough " -"tags \n" -"to cover a volley of messages. Garlic messages may detect the successful " -"tag \n" -"delivery by bundling a small additional message as a clove (a \"delivery " -"status \n" -"message\") - when the garlic message arrives at the intended recipient " -"and \n" -"is decrypted successfully, this small delivery status message is one of " -"the \n" -"cloves exposed and has instructions for the recipient to send the clove " -"back \n" -"to the original sender (through an inbound tunnel, of course). When the " -"original \n" -"sender receives this delivery status message, they know that the session " -"tags \n" +"Each session tag can be used only once so as to prevent internal adversaries \n" +"from unnecessarily correlating different messages as being between the same \n" +"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n" +"when and how many tags to deliver, prestocking the recipient with enough tags \n" +"to cover a volley of messages. Garlic messages may detect the successful tag \n" +"delivery by bundling a small additional message as a clove (a \"delivery status \n" +"message\") - when the garlic message arrives at the intended recipient and \n" +"is decrypted successfully, this small delivery status message is one of the \n" +"cloves exposed and has instructions for the recipient to send the clove back \n" +"to the original sender (through an inbound tunnel, of course). When the original \n" +"sender receives this delivery status message, they know that the session tags \n" "bundled in the garlic message were successfully delivered." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:50 msgid "" "Session tags themselves have a short lifetime, after which they are \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption.\n" -"A session will continue to exist until all its tags are exhausted or " -"expire." +"A session will continue to exist until all its tags are exhausted or expire." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:61 @@ -6299,8 +5707,7 @@ msgid "" "between a Router and a Destination.\n" "Each Router and Destination maintains its own Session Key Manager to\n" "keep track of Session Keys and Session Tags.\n" -"Separate Session Key Managers prevents correlation of multiple " -"Destinations\n" +"Separate Session Key Managers prevents correlation of multiple Destinations\n" "to each other or a Router by adversaries." msgstr "" @@ -6321,14 +5728,14 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:85 -msgid "It is for a new session and contains both ElGamal and AES encrypted blocks" +msgid "" +"It is for a new session and contains both ElGamal and AES encrypted blocks" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:88 msgid "" "When a router receives a message, it will first assume it is from\n" -"an existing session and attempt to look up the Session Tag and decrypt " -"the following data using AES.\n" +"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n" "If that fails, it will assume it is for a new session and attempt to\n" "decrypt it using ElGamal." msgstr "" @@ -6339,8 +5746,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:98 msgid "" -"A New Session ElGamal Message contains two parts, an encrypted ElGamal " -"block\n" +"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n" "and an encrypted AES block." msgstr "" @@ -6366,8 +5772,7 @@ msgid "" "The 32-byte\n" "Session Key\n" "is the identifier for the session.\n" -"The 32-byte Pre-IV will be used to generate the IV for the AES block that" -" follows;\n" +"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n" "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV." msgstr "" @@ -6396,18 +5801,16 @@ msgstr "" #, python-format msgid "" "The data is then AES Encrypted,\n" -"using the session key and IV (calculated from the pre-IV) from the " -"ElGamal section.\n" -"The encrypted AES Block length is variable but is always a multiple of 16" -" bytes.\n" +"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n" +"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n" "

" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:266 #, python-format msgid "" -"Actual max payload length, and max block length, is less than 64 KB; see " -"the I2NP Overview." +"Actual max payload length, and max block length, is less than 64 KB; see the" +" I2NP Overview." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:269 @@ -6436,18 +5839,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:318 msgid "" "The session tag also serves as\n" -"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the " -"sessionTag." +"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:323 msgid "" -"To decode a message from an existing session, a router looks up the " -"Session Tag to find an\n" -"associated Session Key. If the Session Tag is found, the AES block is " -"decrypted using the associated Session Key.\n" -"If the tag is not found, the message is assumed to be a New Session Message." +"To decode a message from an existing session, a router looks up the Session Tag to find an\n" +"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n" +"If the tag is not found, the message is assumed to be a New Session Message." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:331 @@ -6457,38 +5856,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:332 #, python-format msgid "" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"For brief streaming connections or datagrams, these options may be used " -"to significantly reduce bandwidth.\n" -"See the I2CP options specification for " -"details.\n" +"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n" +"See the I2CP options specification for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the I2CP Send Message" -" Expires specification for details." +"See the I2CP Send Message Expires specification for details." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:353 msgid "" -"There are many possible areas to tune the Session Key Manager's " -"algorithms;\n" -"some may interact with the streaming library behavior, or have " -"significant\n" +"There are many possible areas to tune the Session Key Manager's algorithms;\n" +"some may interact with the streaming library behavior, or have significant\n" "impact on overall performance." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:360 msgid "" -"The number of tags delivered could depend on message size, keeping in " -"mind\n" +"The number of tags delivered could depend on message size, keeping in mind\n" "the eventual padding to 1KB at the tunnel message layer." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:365 msgid "" -"Clients could send an estimate of session lifetime to the router, as an " -"advisory\n" +"Clients could send an estimate of session lifetime to the router, as an advisory\n" "on the number of tags required." msgstr "" @@ -6500,15 +5891,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:374 msgid "" -"The router may assume delivery of Session Tags, or await acknowledgement " -"before using them;\n" +"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n" "there are tradeoffs for each strategy." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:379 msgid "" -"For very brief messages, almost the full 222 bytes of the pre-IV and " -"padding fields in the ElGamal block\n" +"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n" "could be used for the entire message, instead of establishing a session." msgstr "" @@ -6520,10 +5909,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:389 msgid "" -"Perhaps things could be more efficient if the Session Tag system was " -"bidirectional,\n" -"so tags delivered in the 'forward' path could be used in the 'reverse' " -"path,\n" +"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n" +"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n" "thus avoiding ElGamal in the initial response.\n" "The router currently plays some tricks like this when sending\n" "tunnel test messages to itself." @@ -6541,12 +5928,9 @@ msgstr "" msgid "" "Several of these ideas may require a new I2NP message type, or\n" "set a flag in the\n" -"Delivery" -" Instructions,\n" +"Delivery Instructions,\n" "or set a magic number in the first few bytes of the Session Key field\n" -"and accept a small risk of the random Session Key matching the magic " -"number." +"and accept a small risk of the random Session Key matching the magic number." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:2 @@ -6563,8 +5947,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:7 msgid "" -"The terms \"garlic routing\" and \"garlic encryption\" are often used " -"rather loosely when referring to I2P's technology.\n" +"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n" "Here, we explain the history of the terms, the various meanings, and\n" "the usage of \"garlic\" methods in I2P." msgstr "" @@ -6574,20 +5957,16 @@ msgid "" "\"Garlic routing\" was first coined by\n" "Michael J. Freedman\n" "in Roger Dingledine's Free Haven \n" -"Master's thesis " -"Section 8.1.1 (June 2000), as derived from \n" +"Master's thesis Section 8.1.1 (June 2000), as derived from \n" "Onion Routing." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:21 msgid "" -"\"Garlic\" may have been used originally by I2P developers because I2P " -"implements a form of\n" -"bundling as Freedman describes, or simply to emphasize general " -"differences from Tor.\n" +"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n" +"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n" "The specific reasoning may be lost to history.\n" -"Generally, when referring to I2P, the term \"garlic\" may mean one of " -"three things:" +"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:28 @@ -6606,54 +5985,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:33 msgid "" -"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven " -"years has not always been precise; therefore the reader is\n" +"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n" "cautioned when encountering the term.\n" "Hopefully, the explanation below will make things clear." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:40 msgid "" -"Onion routing is a technique for building paths, or tunnels, through a " -"series of peers,\n" +"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n" "and then using that tunnel.\n" -"Messages are repeatedly encrypted by the originator, and then decrypted " -"by each hop.\n" -"During the building phase, only the routing instructions for the next hop" -" are exposed to each peer.\n" -"During the operating phase, messages are passed through the tunnel, and " -"the\n" -"message and its routing instructions are only exposed to the endpoint of " -"the tunnel." +"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n" +"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n" +"During the operating phase, messages are passed through the tunnel, and the\n" +"message and its routing instructions are only exposed to the endpoint of the tunnel." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:49 #, python-format msgid "" "This is similar to the way Mixmaster\n" -"(see network comparisons) sends messages " -"- taking a message, encrypting it\n" -"to the recipient's public key, taking that encrypted message and " -"encrypting\n" -"it (along with instructions specifying the next hop), and then taking " -"that\n" -"resulting encrypted message and so on, until it has one layer of " -"encryption\n" +"(see network comparisons) sends messages - taking a message, encrypting it\n" +"to the recipient's public key, taking that encrypted message and encrypting\n" +"it (along with instructions specifying the next hop), and then taking that\n" +"resulting encrypted message and so on, until it has one layer of encryption\n" "per hop along the path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:58 msgid "" -"In this sense, \"garlic routing\" as a general concept is identical to " -"\"onion routing\".\n" -"As implemented in I2P, of course, there are several differences from the " -"implementation in Tor; see below.\n" -"Even so, there are substantial similarities such that I2P benefits from a" -"\n" -"large amount of" -" academic research on onion routing,\n" -"Tor, and similar " -"mixnets." +"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n" +"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n" +"Even so, there are substantial similarities such that I2P benefits from a\n" +"large amount of academic research on onion routing,\n" +"Tor, and similar mixnets." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:67 @@ -6662,15 +6026,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:68 msgid "" -"Michael Freedman defined \"garlic routing\" as an extension to onion " -"routing,\n" +"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n" "in which multiple messages are bundled together.\n" "He called each message a \"bulb\".\n" -"All the messages, each with its own delivery instructions, are exposed at" -" the\n" +"All the messages, each with its own delivery instructions, are exposed at the\n" "endpoint.\n" -"This allows the efficient bundling of an onion routing \"reply block\" " -"with the original message." +"This allows the efficient bundling of an onion routing \"reply block\" with the original message." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:77 @@ -6679,10 +6040,8 @@ msgid "" "Our term for garlic \"bulbs\" is \"cloves\".\n" "Any number of messages can be\n" "contained, instead of just a single message.\n" -"This is a significant distinction from the onion routing implemented in " -"Tor.\n" -"However, it is only one of many major architectural differences between " -"I2P and Tor;\n" +"This is a significant distinction from the onion routing implemented in Tor.\n" +"However, it is only one of many major architectural differences between I2P and Tor;\n" "perhaps it is not, by itself, enough to justify a change in terminology." msgstr "" @@ -6690,10 +6049,8 @@ msgstr "" msgid "" "Another difference\n" "from the method described by Freedman\n" -"is that the path is unidirectional - there is no \"turning point\" as " -"seen in onion routing\n" -"or mixmaster reply blocks, which greatly simplifies the algorithm and " -"allows for more flexible\n" +"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n" +"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n" "and reliable delivery." msgstr "" @@ -6727,16 +6084,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:113 msgid "" -"For publishing some network database entries (dampening the probability " -"of a successful traffic analysis attack) (ElGamal/AES)" +"For publishing some network database entries (dampening the probability of a" +" successful traffic analysis attack) (ElGamal/AES)" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:116 msgid "" -"There are also significant ways that this technique can be used to " -"improve the performance of the network, \n" -"exploiting transport latency/throughput tradeoffs, and branching data " -"through redundant paths to increase reliability." +"There are also significant ways that this technique can be used to improve the performance of the network, \n" +"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:122 @@ -6747,8 +6102,7 @@ msgstr "" msgid "" "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n" "one for outbound and one for inbound traffic.\n" -"Therefore, four tunnels are required for a single round-trip message and " -"reply." +"Therefore, four tunnels are required for a single round-trip message and reply." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:129 @@ -6768,12 +6122,10 @@ msgstr "" msgid "" "Tunnels are a general-purpose mechanism to transport all\n" "I2NP messages, and\n" -"Garlic Messages are not used to " -"build tunnels.\n" +"Garlic Messages are not used to build tunnels.\n" "We do not bundle multiple\n" "I2NP messages into a single\n" -"Garlic Message for unwrapping at " -"the outbound tunnel endpoint;\n" +"Garlic Message for unwrapping at the outbound tunnel endpoint;\n" "the tunnel encryption is sufficient." msgstr "" @@ -6787,14 +6139,12 @@ msgid "" "At the layer above tunnels, I2P delivers end-to-end messages between\n" "Destinations.\n" "Just as within a single tunnel, we use\n" -"ElGamal/AES+SessionTag for the encryption." -"\n" +"ElGamal/AES+SessionTag for the encryption.\n" "Each client message as delivered to the router through the\n" "I2CP interface becomes a single\n" "Garlic Clove\n" "with its own\n" -"Delivery " -"Instructions,\n" +"Delivery Instructions,\n" "inside a\n" "Garlic Message.\n" "Delivery Instructions may specify a Destination, Router, or Tunnel." @@ -6817,18 +6167,13 @@ msgid "" "A\n" "Delivery Status Message,\n" "with\n" -"Delivery " -"Instructions\n" -"specifying that it be sent back to the originating router as an " -"acknowledgment.\n" +"Delivery Instructions\n" +"specifying that it be sent back to the originating router as an acknowledgment.\n" "This is similar to the \"reply block\" or \"reply onion\"\n" "described in the references.\n" -"It is used for determining the success or failure of end to end message " -"delivery.\n" -"The originating router may, upon failure to receive the Delivery Status " -"Message\n" -"within the expected time period, modify the routing to the far-end " -"Destination,\n" +"It is used for determining the success or failure of end to end message delivery.\n" +"The originating router may, upon failure to receive the Delivery Status Message\n" +"within the expected time period, modify the routing to the far-end Destination,\n" "or take other actions." msgstr "" @@ -6840,16 +6185,12 @@ msgid "" "containing a\n" "LeaseSet\n" "for the originating Destination, with\n" -"Delivery " -"Instructions\n" +"Delivery Instructions\n" "specifying the far-end destination's router.\n" -"By periodically bundling a LeaseSet, the router ensures that the far-end " -"will be able\n" +"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n" "to maintain communications.\n" -"Otherwise the far-end would have to query a floodfill router for the " -"network database entry,\n" -"and all LeaseSets would have to be published to the network database, as " -"explained on the\n" +"Otherwise the far-end would have to query a floodfill router for the network database entry,\n" +"and all LeaseSets would have to be published to the network database, as explained on the\n" "network database page." msgstr "" @@ -6859,31 +6200,24 @@ msgid "" "By default, the Delivery Status and Database Store Messages\n" "are bundled when the local LeaseSet changes, when additional\n" "Session Tags\n" -"are delivered, or if the messages have not been bundled in the previous " -"minute.\n" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"are delivered, or if the messages have not been bundled in the previous minute.\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"See the I2CP options specification for " -"details.\n" +"See the I2CP options specification for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the I2CP Send Message" -" Expires specification for details." +"See the I2CP Send Message Expires specification for details." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:224 msgid "" -"Obviously, the additional messages are currently bundled for specific " -"purposes,\n" +"Obviously, the additional messages are currently bundled for specific purposes,\n" "and not part of a general-purpose routing scheme." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:229 msgid "" -"As of release 0.9.12, the Delivery Status Message is wrapped in another " -"Garlic Message\n" -"by the originator so that the contents are encrypted and not visible to " -"routers on the return path." +"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n" +"by the originator so that the contents are encrypted and not visible to routers on the return path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:235 @@ -6907,35 +6241,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:252 #, python-format msgid "" -"The Garlic Message mechanism is very flexible and provides a structure " -"for\n" +"The Garlic Message mechanism is very flexible and provides a structure for\n" "implementing many types of mixnet delivery methods.\n" "Together with the unused delay option in the\n" -"tunnel" -" message Delivery Instructions,\n" -"a wide spectrum of batching, delay, mixing, and routing strategies are " -"possible." +"tunnel message Delivery Instructions,\n" +"a wide spectrum of batching, delay, mixing, and routing strategies are possible." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:260 msgid "" -"In particular, there is potential for much more flexibility at the " -"outbound tunnel endpoint.\n" +"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n" "Messages could possibly be routed from there to one of several tunnels\n" -"(thus minimizing point-to-point connections), or multicast to several " -"tunnels\n" +"(thus minimizing point-to-point connections), or multicast to several tunnels\n" "for redundancy, or streaming audio and video." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:267 msgid "" -"Such experiments may conflict with the need to ensure security and " -"anonymity, such\n" -"as limiting certain routing paths, restricting the types of I2NP messages" -" that may\n" -"be forwarded along various paths, and enforcing certain message " -"expiration times." +"Such experiments may conflict with the need to ensure security and anonymity, such\n" +"as limiting certain routing paths, restricting the types of I2NP messages that may\n" +"be forwarded along various paths, and enforcing certain message expiration times." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:273 @@ -6944,11 +6269,9 @@ msgid "" "As a part of\n" "ElGamal/AES encryption,\n" "a garlic message contains a sender\n" -"specified amount of padding data, allowing the sender to take active " -"countermeasures \n" +"specified amount of padding data, allowing the sender to take active countermeasures \n" "against traffic analysis.\n" -"This is not currently used, beyond the requirement to pad to a multiple " -"of 16 bytes." +"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:282 @@ -6965,10 +6288,8 @@ msgstr "منابع" #: i2p2www/pages/site/docs/how/garlic-routing.html:292 msgid "" -"The term garlic routing was first coined in Roger Dingledine's Free Haven" -" \n" -"Master's thesis " -"(June 2000),\n" +"The term garlic routing was first coined in Roger Dingledine's Free Haven \n" +"Master's thesis (June 2000),\n" "see Section 8.1.1 authored by\n" "Michael J. Freedman." msgstr "" @@ -6998,8 +6319,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:313 msgid "" -"Onion routing was first described in Hiding Routing Information\n" +"Onion routing was first described in Hiding Routing Information\n" "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996." msgstr "" @@ -7009,79 +6329,51 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:4 msgid "" -"I2P is a project to build, deploy, and maintain a network supporting " -"secure and anonymous\n" -"communication. People using I2P are in control of the tradeoffs between " -"anonymity, reliability,\n" -"bandwidth usage, and latency. There is no central point in the network on" -" which pressure can be\n" -"exerted to compromise the integrity, security, or anonymity of the " -"system. The network supports\n" -"dynamic reconfiguration in response to various attacks, and has been " -"designed to make use of\n" -"additional resources as they become available. Of course, all aspects of " -"the network are open and\n" +"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n" +"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n" +"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n" +"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n" +"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n" +"additional resources as they become available. Of course, all aspects of the network are open and\n" "freely available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:14 msgid "" -"Unlike many other anonymizing networks, I2P doesn't try to provide " -"anonymity by hiding the\n" -"originator of some communication and not the recipient, or the other way " -"around. I2P is designed to\n" -"allow peers using I2P to communicate with each other anonymously — " -"both sender and recipient\n" -"are unidentifiable to each other as well as to third parties. For " -"example, today there are both\n" -"in-I2P web sites (allowing anonymous publishing / hosting) as well as " -"HTTP proxies to the normal web\n" -"(allowing anonymous web browsing). Having the ability to run servers " -"within I2P is essential, as it\n" -"is quite likely that any outbound proxies to the normal Internet will be " -"monitored, disabled, or\n" +"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n" +"originator of some communication and not the recipient, or the other way around. I2P is designed to\n" +"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n" +"are unidentifiable to each other as well as to third parties. For example, today there are both\n" +"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n" +"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n" +"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n" "even taken over to attempt more malicious attacks." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:25 #, python-format msgid "" -"The network itself is message oriented - it is essentially a secure and " -"anonymous IP layer, where\n" -"messages are addressed to cryptographic keys (Destinations) and can be " -"significantly larger than IP\n" -"packets. Some example uses of the network include \"I2P Sites\" " -"(webservers hosting normal web\n" -"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a " -"distributed data store. With the\n" -"help of the I2PTunnel application, we are " -"able to stream traditional\n" -"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even " -"streaming audio. Most people\n" -"will not use I2P directly, or even need to know they're using it. Instead" -" their view will be of one\n" -"of the I2P enabled applications, or perhaps as a little controller app to" -" turn on and off various\n" +"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n" +"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n" +"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n" +"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n" +"help of the I2PTunnel application, we are able to stream traditional\n" +"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n" +"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n" +"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n" "proxies to enable the anonymizing functionality." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:37 #, python-format msgid "" -"An essential part of designing, developing, and testing an anonymizing " -"network is to define the threat model, since there is no such thing " -"as \"true\" anonymity, just\n" -"increasingly expensive costs to identify someone. Briefly, I2P's intent " -"is to allow people to\n" -"communicate in arbitrarily hostile environments by providing good " -"anonymity, mixed in with\n" -"sufficient cover traffic provided by the activity of people who require " -"less anonymity. This way,\n" -"some users can avoid detection by a very powerful adversary, while others" -" will try to evade a weaker\n" -"entity, all on the same network, where each one's messages are " -"essentially indistinguishable\n" +"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n" +"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n" +"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n" +"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n" +"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n" +"entity, all on the same network, where each one's messages are essentially indistinguishable\n" "from the others." msgstr "" @@ -7092,12 +6384,9 @@ msgstr "لماذا؟" #: i2p2www/pages/site/docs/how/intro.html:49 #, python-format msgid "" -"There are a multitude of reasons why we need a system to support " -"anonymous communication, and\n" -"everyone has their own personal rationale. There are many other\n" -"efforts working on finding ways to provide varying degrees of " -"anonymity to people through the\n" +"There are a multitude of reasons why we need a system to support anonymous communication, and\n" +"everyone has their own personal rationale. There are many other\n" +"efforts working on finding ways to provide varying degrees of anonymity to people through the\n" "Internet, but we could not find any that met our needs or threat model." msgstr "" @@ -7108,23 +6397,14 @@ msgstr "كيف؟" #: i2p2www/pages/site/docs/how/intro.html:58 #, python-format msgid "" -"The network at a glance is made up of a set of nodes (\"routers\") with a" -" number of unidirectional\n" -"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is " -"identified by a cryptographic RouterIdentity which is\n" -"typically long lived. These routers communicate with each other through " -"existing transport\n" -"mechanisms (TCP, UDP, etc), passing various messages. Client applications" -" have their own\n" -"cryptographic identifier (\"Destination\") which enables it to send and " -"receive messages. These\n" -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels\n" -"that will be used for sending and receiving messages through the network." -" I2P has its own internal\n" -"network database (using a modification of the " -"Kademlia algorithm) for\n" +"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n" +"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n" +"typically long lived. These routers communicate with each other through existing transport\n" +"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n" +"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n" +"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n" +"that will be used for sending and receiving messages through the network. I2P has its own internal\n" +"network database (using a modification of the Kademlia algorithm) for\n" "distributing routing and contact information securely." msgstr "" @@ -7134,91 +6414,62 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:73 msgid "" -"In the above, Alice, Bob, Charlie, and Dave are all running routers with " -"a single Destination on\n" -"their local router. They each have a pair of 2-hop inbound tunnels per " -"destination (labeled 1, 2, 3,\n" -"4, 5 and 6), and a small subset of each of those router's outbound tunnel" -" pool is shown with 2-hop\n" -"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's " -"outbound tunnels are not\n" -"shown, nor are the rest of each router's outbound tunnel pool (typically " -"stocked with a few tunnels\n" -"at a time). When Alice and Bob talk to each other, Alice sends a message " -"out one of her (pink)\n" -"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3" -" or 4). She knows to send\n" -"to those tunnels on the correct router by querying the network database, " -"which is constantly updated\n" +"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n" +"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n" +"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n" +"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n" +"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n" +"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n" +"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n" +"to those tunnels on the correct router by querying the network database, which is constantly updated\n" "as new leases are authorized and old ones expire." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:85 #, python-format msgid "" -"If Bob wants to reply to Alice, he simply goes through the same process -" -" send a message out one of\n" -"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 " -"or 2). To make things\n" -"easier, most messages sent between Alice and Bob are garlic\n" -"wrapped, bundling the sender's own current lease information so that the " -"recipient can reply\n" -"immediately without having to look in the network database for the " -"current data." +"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n" +"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n" +"easier, most messages sent between Alice and Bob are garlic\n" +"wrapped, bundling the sender's own current lease information so that the recipient can reply\n" +"immediately without having to look in the network database for the current data." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:93 #, python-format msgid "" -"To deal with a wide range of attacks, I2P is fully distributed with no " -"centralized resources - and\n" -"hence there are no directory servers keeping statistics regarding the " -"performance and reliability of\n" -"routers within the network. As such, each router must keep and maintain " -"profiles of various routers\n" -"and is responsible for selecting appropriate peers to meet the anonymity," -" performance, and\n" -"reliability needs of the users, as described in the peer selection\n" +"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n" +"hence there are no directory servers keeping statistics regarding the performance and reliability of\n" +"routers within the network. As such, each router must keep and maintain profiles of various routers\n" +"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n" +"reliability needs of the users, as described in the peer selection\n" "page." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:102 #, python-format msgid "" -"The network itself makes use of a significant number of cryptographic\n" -"techniques and algorithms - a full laundry list includes 2048bit " -"ElGamal encryption, 256bit AES\n" -"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, " -"2048bit Diffie-Hellman\n" -"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag." +"The network itself makes use of a significant number of cryptographic\n" +"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n" +"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n" +"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:110 msgid "" -"Content sent over I2P is encrypted through three layers garlic encryption" -" (used to verify the\n" -"delivery of the message to the recipient), tunnel encryption (all " -"messages passing through a tunnel\n" -"is encrypted by the tunnel gateway to the tunnel endpoint), and inter " -"router transport layer\n" +"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n" +"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n" +"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n" "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:117 msgid "" "End-to-end (I2CP) encryption (client application to\n" -"server application) was disabled in I2P release 0.6; end-to-end (garlic) " -"encryption (I2P client router\n" -"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" " -"remains. Notice the different use of\n" -"terms! All data from a to h is end-to-end encrypted, but the I2CP " -"connection between the I2P router and\n" -"the applications is not end-to-end encrypted! A and h are the routers of " -"Alice and Bob, while Alice and\n" +"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n" +"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n" +"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n" +"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n" "Bob in following chart are the applications running atop of I2P." msgstr "" @@ -7235,32 +6486,22 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:132 msgid "" -"The two main mechanisms for allowing people who need strong anonymity to " -"use the network are\n" -"explicitly delayed garlic routed messages and more comprehensive tunnels " -"to include support for\n" -"pooling and mixing messages. These are currently planned for release 3.0," -" but garlic routed messages\n" -"with no delays and FIFO tunnels are currently in place. Additionally, the" -" 2.0 release will allow\n" -"people to set up and operate behind restricted routes (perhaps with " -"trusted peers), as well as the\n" +"The two main mechanisms for allowing people who need strong anonymity to use the network are\n" +"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n" +"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n" +"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n" +"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n" "deployment of more flexible and anonymous transports." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:141 #, python-format msgid "" -"Some questions have been raised with regards to the scalability of I2P, " -"and reasonably so. There\n" -"will certainly be more analysis over time, but peer lookup and " -"integration should be bounded by\n" -"O(log(N)) due to the network " -"database's algorithm, while end\n" -"to end messages should be O(1) (scale free), since messages " -"go out K hops through the\n" -"outbound tunnel and another K hops through the inbound tunnel, with K no " -"longer than 3. The size of\n" +"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n" +"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n" +"O(log(N)) due to the network database's algorithm, while end\n" +"to end messages should be O(1) (scale free), since messages go out K hops through the\n" +"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n" "the network (N) bears no impact." msgstr "" @@ -7272,13 +6513,10 @@ msgstr "متى؟" #, python-format msgid "" "I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use " -"alternate transports, such as Freenet to allow it to use alternate transports, such as JMS, then grew into its own as an\n" -"'anonCommFramework' in April 2003, turning into I2P in July, with code " -"being written in earnest\n" -"starting in August '03. I2P is currently under development, following the" -" roadmap." +"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n" +"starting in August '03. I2P is currently under development, following the roadmap." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:161 @@ -7288,22 +6526,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:162 #, python-format msgid "" -"We have a small team spread around several " -"continents, working to advance\n" -"different aspects of the project. We are very open to other developers " -"who want to get involved and\n" -"anyone else who would like to contribute in other ways, such as " -"critiques, peer review, testing,\n" -"writing I2P enabled applications, or documentation. The entire system is " -"open source - the router\n" -"and most of the SDK are outright public domain with some BSD and Cryptix " -"licensed code, while some\n" -"applications like I2PTunnel and I2PSnark are GPL. Almost everything is " -"written in Java (1.5+),\n" -"though some third party applications are being written in Python and " -"other languages. The code works\n" -"on Sun Java SE and other Java Virtual" -" Machines." +"We have a small team spread around several continents, working to advance\n" +"different aspects of the project. We are very open to other developers who want to get involved and\n" +"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n" +"writing I2P enabled applications, or documentation. The entire system is open source - the router\n" +"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n" +"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n" +"though some third party applications are being written in Python and other languages. The code works\n" +"on Sun Java SE and other Java Virtual Machines." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:173 @@ -7313,12 +6543,9 @@ msgstr "أين؟" #: i2p2www/pages/site/docs/how/intro.html:174 #, python-format msgid "" -"Anyone interested should join us on the IRC channel #i2p-dev (hosted " -"concurrently on irc.freenode.net,\n" -"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are" -" currently no\n" -"scheduled development meetings, however archives" -" are available." +"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n" +"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n" +"scheduled development meetings, however archives are available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:180 @@ -7342,39 +6569,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:8 msgid "" "I2P's netDb is a specialized distributed database, containing \n" -"just two types of data - router contact information (RouterInfos) " -"and destination contact\n" -"information (LeaseSets). Each piece of data is signed by the " -"appropriate party and verified\n" -"by anyone who uses or stores it. In addition, the data has liveliness " -"information\n" -"within it, allowing irrelevant entries to be dropped, newer entries to " -"replace\n" +"just two types of data - router contact information (RouterInfos) and destination contact\n" +"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n" +"by anyone who uses or stores it. In addition, the data has liveliness information\n" +"within it, allowing irrelevant entries to be dropped, newer entries to replace\n" "older ones, and protection against certain classes of attack." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:17 msgid "" "The netDb is distributed with a simple technique called \"floodfill\",\n" -"where a subset of all routers, called \"floodfill routers\", maintains " -"the distributed database." +"where a subset of all routers, called \"floodfill routers\", maintains the distributed database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:25 msgid "" -"When an I2P router wants to contact another router, they need to know " -"some \n" -"key pieces of data - all of which are bundled up and signed by the router" -" into\n" -"a structure called the \"RouterInfo\", which is distributed with the " -"SHA256 of the router's identity\n" +"When an I2P router wants to contact another router, they need to know some \n" +"key pieces of data - all of which are bundled up and signed by the router into\n" +"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n" "as the key. The structure itself contains:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:32 msgid "" -"The router's identity (an encryption key, a signing key, and a " -"certificate)" +"The router's identity (an encryption key, a signing key, and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:33 @@ -7405,8 +6623,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:47 msgid "" -"Capabilities flags - used to indicate floodfill participation, " -"approximate bandwidth, and perceived reachability" +"Capabilities flags - used to indicate floodfill participation, approximate " +"bandwidth, and perceived reachability" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:49 @@ -7465,23 +6683,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:76 msgid "" -"Always sent as 90m, for compatibility with an older scheme where routers " -"published their actual uptime,\n" +"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n" "and only sent tunnel requests to peers whose uptime was more than 60m" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:82 msgid "" "These values are used by other routers for basic decisions.\n" -"Should we connect to this router? Should we attempt to route a tunnel " -"through this router?\n" -"The bandwidth capability flag, in particular, is used only to determine " -"whether\n" +"Should we connect to this router? Should we attempt to route a tunnel through this router?\n" +"The bandwidth capability flag, in particular, is used only to determine whether\n" "the router meets a minimum threshold for routing tunnels.\n" -"Above the minimum threshold, the advertised bandwidth is not used or " -"trusted anywhere\n" -"in the router, except for display in the user interface and for debugging" -" and network analysis." +"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n" +"in the router, except for display in the user interface and for debugging and network analysis." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:102 @@ -7492,13 +6705,11 @@ msgstr "خيارات إضافية" #, python-format msgid "" "Additional text options include\n" -"a small number of statistics about the router's health, which are " -"aggregated by\n" +"a small number of statistics about the router's health, which are aggregated by\n" "sites such as %(stats)s\n" "for network performance analysis and debugging.\n" "These statistics were chosen to provide data crucial to the developers,\n" -"such as tunnel build success rates, while balancing the need for such " -"data\n" +"such as tunnel build success rates, while balancing the need for such data\n" "with the side-effects that could result from revealing this data.\n" "Current statistics are limited to:" msgstr "" @@ -7513,18 +6724,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:119 msgid "" -"Floodfill routers publish additional data on the number of entries in " -"their network database." +"Floodfill routers publish additional data on the number of entries in their " +"network database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:123 msgid "" "The data published can be seen in the router's user interface,\n" "but is not used or trusted within the router.\n" -"As the network has matured, we have gradually removed most of the " -"published\n" -"statistics to improve anonymity, and we plan to remove more in future " -"releases." +"As the network has matured, we have gradually removed most of the published\n" +"statistics to improve anonymity, and we plan to remove more in future releases." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:130 @@ -7533,8 +6742,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:132 msgid "" -"As of release 0.9.24, routers may declare that they are part of a " -"\"family\", operated by the same entity.\n" +"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n" "Multiple routers in the same family will not be used in a single tunnel." msgstr "" @@ -7553,16 +6761,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:159 msgid "" "RouterInfos have no set expiration time.\n" -"Each router is free to maintain its own local policy to trade off the " -"frequency of RouterInfo lookups\n" +"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n" "with memory or disk usage.\n" "In the current implementation, there are the following general policies:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:166 msgid "" -"There is no expiration during the first hour of uptime, as the persistent" -" stored data may be old." +"There is no expiration during the first hour of uptime, as the persistent " +"stored data may be old." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:169 @@ -7571,25 +6778,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:172 msgid "" -"As the number of local RouterInfos grows, the expiration time shrinks, in" -" an attempt to maintain\n" -"a reasonable number RouterInfos. The expiration time with less than 120 " -"routers is 72 hours,\n" +"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n" +"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n" "while expiration time with 300 routers is around 30 hours." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:177 #, python-format msgid "" -"RouterInfos containing SSU introducers expire in " -"about an hour, as\n" +"RouterInfos containing SSU introducers expire in about an hour, as\n" "the introducer list expires in about that time." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:181 msgid "" -"Floodfills use a short expiration time (1 hour) for all local " -"RouterInfos, as valid RouterInfos will\n" +"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n" "be frequently republished to them." msgstr "" @@ -7605,8 +6808,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:192 msgid "" -"It may be desirable to persistently store Meta LeaseSets with long " -"expirations.\n" +"It may be desirable to persistently store Meta LeaseSets with long expirations.\n" "This is implementation-dependent." msgstr "" @@ -7620,10 +6822,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:212 msgid "" -"The second piece of data distributed in the netDb is a \"LeaseSet\" - " -"documenting\n" -"a group of tunnel entry points (leases) for a particular client " -"destination.\n" +"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n" +"a group of tunnel entry points (leases) for a particular client destination.\n" "Each of these leases specify the following information:" msgstr "" @@ -7649,8 +6849,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:454 msgid "" "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n" -"The SHA256 of the type byte (3) followed by the blinded public key is " -"used for the DHT key,\n" +"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n" "and then rotated as usual." msgstr "" @@ -7664,14 +6863,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:239 msgid "" -"The destination itself (an encryption key, a signing key and a " -"certificate)" +"The destination itself (an encryption key, a signing key and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:240 msgid "" -"Additional encryption public key: used for end-to-end encryption of " -"garlic messages" +"Additional encryption public key: used for end-to-end encryption of garlic " +"messages" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:241 @@ -7682,8 +6880,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:242 msgid "" -"Signature of all the LeaseSet data, to make sure the Destination " -"published the LeaseSet." +"Signature of all the LeaseSet data, to make sure the Destination published " +"the LeaseSet." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:246 @@ -7714,13 +6912,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:263 msgid "" -"A LeaseSet for a destination used only for outgoing connections is " -"unpublished.\n" +"A LeaseSet for a destination used only for outgoing connections is unpublished.\n" "It is never sent for publication to a floodfill router.\n" -"\"Client\" tunnels, such as those for web browsing and IRC clients, are " -"unpublished.\n" -"Servers will still be able to send messages back to those unpublished " -"destinations,\n" +"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n" +"Servers will still be able to send messages back to those unpublished destinations,\n" "because of I2NP storage messages." msgstr "" @@ -7730,24 +6925,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:274 msgid "" -"A LeaseSet may be revoked by publishing a new LeaseSet with zero " -"leases.\n" -"Revocations must be signed by the additional signing key in the LeaseSet." -"\n" -"Revocations are not fully implemented, and it is unclear if they have any" -" practical use.\n" -"This is the only planned use for that signing key, so it is currently " -"unused." +"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n" +"Revocations must be signed by the additional signing key in the LeaseSet.\n" +"Revocations are not fully implemented, and it is unclear if they have any practical use.\n" +"This is the only planned use for that signing key, so it is currently unused." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:283 msgid "" "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n" -"This structure is very similar to the old LeaseSet structure, and serves " -"the same purpose.\n" +"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n" "The new structure provides the flexibility required to support new\n" -"encryption types, multiple encryption types, options, offline signing " -"keys,\n" +"encryption types, multiple encryption types, options, offline signing keys,\n" "and other features.\n" "See proposal 123 for details." msgstr "" @@ -7756,15 +6945,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:715 msgid "" "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n" -"This structure provides a tree-like structure in the DHT, to refer to " -"other LeaseSets.\n" -"Using Meta LeaseSets, a site may implement large multihomed services, " -"where several\n" +"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n" +"Using Meta LeaseSets, a site may implement large multihomed services, where several\n" "different Destinations are used to provide a common service.\n" "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n" "and may have long expirations, up to 18.2 hours.\n" -"Using this facility, it should be possible to run hundreds or thousands " -"of Destinations hosting a common service.\n" +"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n" "See proposal 123 for details." msgstr "" @@ -7782,29 +6968,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:313 msgid "" -"In an encrypted LeaseSet, all Leases are encrypted with a separate" -" key.\n" -"The leases may only be decoded, and thus the destination may only be " -"contacted,\n" +"In an encrypted LeaseSet, all Leases are encrypted with a separate key.\n" +"The leases may only be decoded, and thus the destination may only be contacted,\n" "by those with the key.\n" -"There is no flag or other direct indication that the LeaseSet is " -"encrypted.\n" -"Encrypted LeaseSets are not widely used, and it is a topic for future " -"work to\n" -"research whether the user interface and implementation of encrypted " -"LeaseSets could be improved." +"There is no flag or other direct indication that the LeaseSet is encrypted.\n" +"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n" +"research whether the user interface and implementation of encrypted LeaseSets could be improved." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:324 msgid "" -"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet " -"structure.\n" -"The Destination is hidden, and only a blinded public key and an " -"expiration\n" +"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n" +"The Destination is hidden, and only a blinded public key and an expiration\n" "are visible to the floodfill.\n" "Only those that have the full Destination may decrypt the structure.\n" -"The structure is stored at a DHT location based on the hash of the " -"blinded public key,\n" +"The structure is stored at a DHT location based on the hash of the blinded public key,\n" "not the hash of the Destination.\n" "See proposal 123 for details." msgstr "" @@ -7815,12 +6993,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:336 msgid "" -"For regular LeaseSets, the expiration is the time of the latest " -"expiration of its leases.\n" -"For the new LeaseSet2 data structures, the expiration is specified in the" -" header.\n" -"For LeaseSet2, the expiration should match the latest expiration of its " -"leases.\n" +"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n" +"For the new LeaseSet2 data structures, the expiration is specified in the header.\n" +"For LeaseSet2, the expiration should match the latest expiration of its leases.\n" "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n" "and maximum expiration may be enforced, to be determined." msgstr "" @@ -7831,8 +7006,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:346 msgid "" -"No persistent storage of LeaseSet data is required, since they expire so " -"quickly.\n" +"No persistent storage of LeaseSet data is required, since they expire so quickly.\n" "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n" "with long expirations may be advisable." msgstr "" @@ -7858,42 +7032,30 @@ msgstr "" msgid "" "The netDb is decentralized, however you do need at\n" "least one reference to a peer so that the integration process\n" -"ties you in. This is accomplished by \"reseeding\" your router with the " -"RouterInfo\n" -"of an active peer - specifically, by retrieving their " -"routerInfo-$hash.dat\n" -"file and storing it in your netDb/ directory. Anyone can " -"provide\n" -"you with those files - you can even provide them to others by exposing " -"your own\n" +"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n" +"of an active peer - specifically, by retrieving their routerInfo-$hash.dat\n" +"file and storing it in your netDb/ directory. Anyone can provide\n" +"you with those files - you can even provide them to others by exposing your own\n" "netDb directory. To simplify the process,\n" -"volunteers publish their netDb directories (or a subset) on the regular " -"(non-i2p) network,\n" +"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n" "and the URLs of these directories are hardcoded in I2P.\n" -"When the router starts up for the first time, it automatically fetches " -"from\n" +"When the router starts up for the first time, it automatically fetches from\n" "one of these URLs, selected at random." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:379 msgid "" -"The floodfill netDb is a simple distributed storage mechanism. The " -"storage\n" -"algorithm is simple: send the data to the closest peer that has " -"advertised\n" -"itself as a floodfill router. When the peer in the floodfill netDb " -"receives a\n" -"netDb store from a peer not in the floodfill netDb, they send it to a " -"subset of\n" -"the floodfill netDb-peers. The peers selected are the ones closest " -"(according\n" +"The floodfill netDb is a simple distributed storage mechanism. The storage\n" +"algorithm is simple: send the data to the closest peer that has advertised\n" +"itself as a floodfill router. When the peer in the floodfill netDb receives a\n" +"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n" +"the floodfill netDb-peers. The peers selected are the ones closest (according\n" "to the XOR-metric) to a specific key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:388 msgid "" -"Determining who is part of the floodfill netDb is trivial - it is exposed" -" in each \n" +"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n" "router's published routerInfo as a capability." msgstr "" @@ -7923,15 +7085,13 @@ msgid "" "Routers with high bandwidth limits (which must be manually configured,\n" "as the default is much lower) are presumed to be on lower-latency\n" "connections, and are more likely to be available 24/7.\n" -"The current minimum share bandwidth for a floodfill router is 128 " -"KBytes/sec." +"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:419 msgid "" "In addition, a router must pass several additional tests for health\n" -"(outbound message queue time, job lag, etc.) before floodfill operation " -"is\n" +"(outbound message queue time, job lag, etc.) before floodfill operation is\n" "automatically enabled." msgstr "" @@ -7958,13 +7118,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:441 msgid "" -"A floodfill router's only services that are in addition to those of non-" -"floodfill routers\n" +"A floodfill router's only services that are in addition to those of non-floodfill routers\n" "are in accepting netDb stores and responding to netDb queries.\n" -"Since they are generally high-bandwidth, they are more likely to " -"participate in a high number of tunnels\n" -"(i.e. be a \"relay\" for others), but this is not directly related to " -"their distributed database services." +"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n" +"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:449 @@ -7973,33 +7130,24 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:450 msgid "" -"The netDb uses a simple Kademlia-style XOR metric to determine closeness." -"\n" -"To create a Kademlia key, the SHA256 hash of the RouterIdentity or " -"Destination is computed." +"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n" +"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:459 msgid "" -"A modification to this algorithm is done to increase the costs of Sybil attacks.\n" -"Instead of the SHA256 hash of the key being looked up of stored, the " -"SHA256 hash is taken\n" -"of the 32-byte binary search key appended with the UTC date represented " -"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" -"This is called the \"routing key\", and it changes every day at midnight " -"UTC.\n" -"Only the search key is modified in this way, not the floodfill router " -"hashes.\n" -"The daily transformation of the DHT is sometimes called \"keyspace " -"rotation\",\n" +"A modification to this algorithm is done to increase the costs of Sybil attacks.\n" +"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n" +"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" +"This is called the \"routing key\", and it changes every day at midnight UTC.\n" +"Only the search key is modified in this way, not the floodfill router hashes.\n" +"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n" "although it isn't strictly a rotation." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:469 msgid "" -"Routing keys are never sent on-the-wire in any I2NP message, they are " -"only used locally for\n" +"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n" "determination of distance." msgstr "" @@ -8014,8 +7162,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:479 #, python-format msgid "" -"I2NP DatabaseStoreMessages containing the local " -"RouterInfo are exchanged with peers\n" +"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n" "as a part of the initialization of a NTCP\n" "or SSU transport connection." msgstr "" @@ -8027,46 +7174,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:487 #, python-format msgid "" -"I2NP DatabaseStoreMessages containing the local " -"LeaseSet are periodically exchanged with peers\n" -"by bundling them in a garlic message along with normal traffic from the " -"related Destination.\n" -"This allows an initial response, and later responses, to be sent to an " -"appropriate Lease,\n" -"without requiring any LeaseSet lookups, or requiring the communicating " -"Destinations to have published LeaseSets at all." +"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n" +"by bundling them in a garlic message along with normal traffic from the related Destination.\n" +"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n" +"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:495 msgid "" "The DatabaseStoreMessage should be sent to the floodfill that is closest\n" "to the current routing key for the RouterInfo or LeaseSet being stored.\n" -"Currently, the closest floodfill is found by a search in the local " -"database.\n" -"Even if that floodfill is not actually closest, it will flood it " -"\"closer\" by\n" +"Currently, the closest floodfill is found by a search in the local database.\n" +"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n" "sending it to multiple other floodfills.\n" "This provides a high degree of fault-tolerance." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:504 msgid "" -"In traditional Kademlia, a peer would do a \"find-closest\" search before" -" inserting\n" -"an item in the DHT to the closest target. As the verify operation will " -"tend to\n" -"discover closer floodfills if they are present, a router will quickly " -"improve\n" -"its knowledge of the DHT \"neighborhood\" for the RouterInfo and " -"LeaseSets it regularly publishes.\n" -"While I2NP does not define a \"find-closest\" message, if it becomes " -"necessary,\n" -"a router may simply do an iterative search for a key with the least " -"significant bit flipped\n" -"(i.e. key ^ 0x01) until no closer peers are received in the " -"DatabaseSearchReplyMessages.\n" -"This ensures that the true closest peer will be found even if a more-" -"distant peer had\n" +"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n" +"an item in the DHT to the closest target. As the verify operation will tend to\n" +"discover closer floodfills if they are present, a router will quickly improve\n" +"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n" +"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n" +"a router may simply do an iterative search for a key with the least significant bit flipped\n" +"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n" +"This ensures that the true closest peer will be found even if a more-distant peer had\n" "the netdb item." msgstr "" @@ -8077,11 +7210,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:518 #, python-format msgid "" -"A router publishes its own RouterInfo by directly connecting to a " -"floodfill router\n" +"A router publishes its own RouterInfo by directly connecting to a floodfill router\n" "and sending it a I2NP DatabaseStoreMessage\n" -"with a nonzero Reply Token. The message is not end-to-end garlic " -"encrypted,\n" +"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n" "as this is a direct connection, so there are no intervening routers\n" "(and no need to hide this data anyway).\n" "The floodfill router replies with a\n" @@ -8095,8 +7226,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:533 msgid "" -"Storage of LeaseSets is much more sensitive than for RouterInfos, as a " -"router\n" +"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n" "must take care that the LeaseSet cannot be associated with the router." msgstr "" @@ -8105,10 +7235,8 @@ msgstr "" msgid "" "A router publishes a local LeaseSet by\n" "sending a I2NP DatabaseStoreMessage\n" -"with a nonzero Reply Token over an outbound client tunnel for that " -"Destination.\n" -"The message is end-to-end garlic encrypted using the Destination's " -"Session Key Manager,\n" +"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n" +"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n" "to hide the message from the tunnel's outbound endpoint.\n" "The floodfill router replies with a\n" "I2NP DeliveryStatusMessage,\n" @@ -8124,17 +7252,12 @@ msgstr "" #, python-format msgid "" "After a floodfill router receives a DatabaseStoreMessage containing a\n" -"valid RouterInfo or LeaseSet which is newer than that previously stored " -"in its\n" +"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n" "local NetDb, it \"floods\" it.\n" -"To flood a NetDb entry, it looks up several (currently %(floodsize)s) " -"floodfill routers closest to the routing key\n" -"of the NetDb entry. (The routing key is the SHA256 Hash of the " -"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" -"By flooding to those closest to the key, not closest to itself, the " -"floodfill ensures that the storage\n" -"gets to the right place, even if the storing router did not have good " -"knowledge of the\n" +"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n" +"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" +"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n" +"gets to the right place, even if the storing router did not have good knowledge of the\n" "DHT \"neighborhood\" for the routing key." msgstr "" @@ -8156,17 +7279,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:574 #, python-format msgid "" -"The I2NP DatabaseLookupMessage is used to " -"request a netdb entry from a floodfill router.\n" +"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n" "Lookups are sent out one of the router's outbound exploratory tunnels.\n" -"The replies are specified to return via one of the router's inbound " -"exploratory tunnels." +"The replies are specified to return via one of the router's inbound exploratory tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:580 msgid "" -"Lookups are generally sent to the two \"good\" (the connection doesn't " -"fail) floodfill routers closest to the requested key, in parallel." +"Lookups are generally sent to the two \"good\" (the connection doesn't fail)" +" floodfill routers closest to the requested key, in parallel." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:584 @@ -8174,8 +7295,7 @@ msgstr "" msgid "" "If the key is found locally by the floodfill router, it responds with a\n" "I2NP DatabaseStoreMessage.\n" -"If the key is not found locally by the floodfill router, it responds with" -" a\n" +"If the key is not found locally by the floodfill router, it responds with a\n" "I2NP DatabaseSearchReplyMessage\n" "containing a list of other floodfill routers close to the key." msgstr "" @@ -8183,22 +7303,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:592 msgid "" "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n" -"RouterInfo lookups are not encrypted and thus are vulnerable to snooping " -"by the outbound endpoint\n" -"(OBEP) of the client tunnel. This is due to the expense of the ElGamal " -"encryption.\n" +"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n" +"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n" "RouterInfo lookup encryption may be enabled in a future release." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:599 msgid "" -"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage" -" or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted by including the session key and tag in the lookup.\n" -"This hides the reply from the inbound gateway (IBGW) of the reply tunnel." -"\n" -"Responses to RouterInfo lookups will be encrypted if we enable the lookup" -" encryption." +"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n" +"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:606 @@ -8212,41 +7327,31 @@ msgstr "" msgid "" "Due to the relatively small size of the network and flooding redundancy,\n" "lookups are usually O(1) rather than O(log n).\n" -"A router is highly likely to know a floodfill router close enough to the " -"key to get the answer on the first try.\n" +"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n" "In releases prior to 0.8.9, routers used a lookup redundancy of two\n" -"(that is, two lookups were performed in parallel to different peers), and" -"\n" -"neither recursive nor iterative routing for lookups was " -"implemented.\n" +"(that is, two lookups were performed in parallel to different peers), and\n" +"neither recursive nor iterative routing for lookups was implemented.\n" "Queries were sent through multiple routes simultaneously\n" "to reduce the chance of query failure." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:621 msgid "" -"As of release 0.8.9, iterative lookups are implemented with no " -"lookup redundancy.\n" +"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n" "This is a more efficient and reliable lookup that will work much better\n" "when not all floodfill peers are known, and it removes a serious\n" -"limitation to network growth. As the network grows and each router knows " -"only a small\n" +"limitation to network growth. As the network grows and each router knows only a small\n" "subset of the floodfill peers, lookups will become O(log n).\n" -"Even if the peer does not return references closer to the key, the lookup" -" continues with\n" -"the next-closest peer, for added robustness, and to prevent a malicious " -"floodfill from\n" -"black-holing a part of the key space. Lookups continue until a total " -"lookup timeout is reached,\n" +"Even if the peer does not return references closer to the key, the lookup continues with\n" +"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n" +"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n" "or the maximum number of peers is queried." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:633 msgid "" -"Node IDs are verifiable in that we use the router hash " -"directly as both the node ID and the Kademlia key.\n" -"Incorrect responses that are not closer to the search key are generally " -"ignored.\n" +"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n" +"Incorrect responses that are not closer to the search key are generally ignored.\n" "Given the current size of the network, a router has\n" "detailed knowledge of the neighborhood of the destination ID space." msgstr "" @@ -8258,8 +7363,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:643 #, python-format msgid "" -"Note: RouterInfo verification is disabled as of release 0.9.7.1 to " -"prevent\n" +"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n" "the attack described in the paper\n" "Practical Attacks Against the I2P Network.\n" "It is not clear if verification can be redesigned to be done safely." @@ -8267,13 +7371,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:650 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" "Lookups sent out one of the router's outbound exploratory tunnels.\n" -"Lookups are end-to-end garlic encrypted to prevent snooping by the " -"outbound endpoint(OBEP)." +"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:658 @@ -8282,22 +7384,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:659 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" -"Lookups sent out one of the outbound client tunnels for the destination " -"of the LeaseSet being verified.\n" +"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n" "To prevent snooping by the OBEP of the outbound tunnel,\n" "lookups are end-to-end garlic encrypted.\n" -"The replies are specified to return via one of the client's inbound " -"tunnels." +"The replies are specified to return via one of the client's inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:669 msgid "" -"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a " -"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted,\n" "to hide the reply from the inbound gateway (IBGW) of the reply tunnel." msgstr "" @@ -8309,23 +7407,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:678 #, python-format msgid "" -"Exploration is a special form of netdb lookup, where a router " -"attempts to learn about\n" +"Exploration is a special form of netdb lookup, where a router attempts to learn about\n" "new routers.\n" -"It does this by sending a floodfill router a I2NP DatabaseLookup Message, looking for a random " -"key.\n" +"It does this by sending a floodfill router a I2NP DatabaseLookup Message, looking for a random key.\n" "As this lookup will fail, the floodfill would normally respond with a\n" -"I2NP DatabaseSearchReplyMessage containing " -"hashes of floodfill routers close to the key.\n" -"This would not be helpful, as the requesting router probably already " -"knows those floodfills,\n" -"and it would be impractical to add all floodfill routers to the \"don't " -"include\" field of the DatabaseLookup Message.\n" +"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n" +"This would not be helpful, as the requesting router probably already knows those floodfills,\n" +"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n" "For an exploration query, the requesting router sets a special flag in\n" "the DatabaseLookup Message.\n" -"The floodfill will then respond only with non-floodfill routers close to " -"the requested key." +"The floodfill will then respond only with non-floodfill routers close to the requested key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:692 @@ -8334,14 +7425,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:693 msgid "" -"The response to a lookup request is either a Database Store Message (on " -"success) or a\n" -"Database Search Reply Message (on failure). The DSRM contains a 'from' " -"router hash field\n" +"The response to a lookup request is either a Database Store Message (on success) or a\n" +"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n" "to indicate the source of the reply; the DSM does not.\n" "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n" -"There are no other response tags. Therefore, when making multiple " -"requests in parallel, it is\n" +"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n" "difficult to monitor the performance of the various floodfill routers." msgstr "" @@ -8351,19 +7439,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:705 msgid "" -"Destinations may be hosted on multiple routers simultaneously, by using " -"the same\n" +"Destinations may be hosted on multiple routers simultaneously, by using the same\n" "private and public keys (traditionally stored in eepPriv.dat files).\n" -"As both instances will periodically publish their signed LeaseSets to the" -" floodfill peers,\n" -"the most recently published LeaseSet will be returned to a peer " -"requesting a database lookup.\n" -"As LeaseSets have (at most) a 10 minute lifetime, should a particular " -"instance go down,\n" -"the outage will be 10 minutes at most, and generally much less than that." -"\n" -"The multihoming function has been verified and is in use by several " -"services on the network." +"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n" +"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n" +"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n" +"the outage will be 10 minutes at most, and generally much less than that.\n" +"The multihoming function has been verified and is in use by several services on the network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:727 @@ -8393,8 +7475,7 @@ msgstr "" #, python-format msgid "" "There are currently around %(ffcount)s floodfill routers in the network.\n" -"Most of the following attacks will become more difficult, or have less " -"impact,\n" +"Most of the following attacks will become more difficult, or have less impact,\n" "as the network size and number of floodfill routers increase." msgstr "" @@ -8405,8 +7486,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:748 #, python-format msgid "" -"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill" -" routers closest to the key." +"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill " +"routers closest to the key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:753 @@ -8427,8 +7508,7 @@ msgstr "" #, python-format msgid "" "Each router maintains an expanded set of statistics in the\n" -"peer profile for each floodfill router," -"\n" +"peer profile for each floodfill router,\n" "covering various quality metrics for that peer.\n" "The set includes:" msgstr "" @@ -8459,14 +7539,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:775 msgid "" -"Each time a router needs to make a determination on which floodfill " -"router is closest to a key,\n" +"Each time a router needs to make a determination on which floodfill router is closest to a key,\n" "it uses these metrics to determine which floodfill routers are \"good\".\n" -"The methods, and thresholds, used to determine \"goodness\" are " -"relatively new, and\n" +"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n" "are subject to further analysis and improvement.\n" -"While a completely unresponsive router will quickly be identified and " -"avoided,\n" +"While a completely unresponsive router will quickly be identified and avoided,\n" "routers that are only sometimes malicious may be much harder to deal with." msgstr "" @@ -8478,8 +7555,7 @@ msgstr "" #, python-format msgid "" "An attacker may mount a Sybil attack\n" -"by creating a large number of floodfill routers spread throughout the " -"keyspace." +"by creating a large number of floodfill routers spread throughout the keyspace." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:791 @@ -8487,35 +7563,29 @@ msgstr "" msgid "" "(In a related example, a researcher recently created a\n" "large number of Tor relays.)\n" -"If successful, this could be an effective DOS attack on the entire " -"network." +"If successful, this could be an effective DOS attack on the entire network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:797 msgid "" -"If the floodfills are not sufficiently misbehaving to be marked as " -"\"bad\" using the peer profile\n" +"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n" "metrics described above, this is a difficult scenario to handle.\n" -"Tor's response can be much more nimble in the relay case, as the " -"suspicious relays\n" +"Tor's response can be much more nimble in the relay case, as the suspicious relays\n" "can be manually removed from the consensus.\n" -"Some possible responses for the I2P network are listed below, however " -"none of them is completely satisfactory:" +"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:805 msgid "" -"Compile a list of bad router hashes or IPs, and announce the list through" -" various means\n" -"(console news, website, forum, etc.); users would have to manually " -"download the list and\n" +"Compile a list of bad router hashes or IPs, and announce the list through various means\n" +"(console news, website, forum, etc.); users would have to manually download the list and\n" "add it to their local \"blacklist\"." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:810 msgid "" -"Ask everyone in the network to enable floodfill manually (fight Sybil " -"with more Sybil)" +"Ask everyone in the network to enable floodfill manually (fight Sybil with " +"more Sybil)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:811 @@ -8524,8 +7594,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:812 msgid "" -"Release a new software version that improves the peer profile metrics and" -" thresholds,\n" +"Release a new software version that improves the peer profile metrics and thresholds,\n" "in an attempt to automatically identify the \"bad\" peers." msgstr "" @@ -8537,12 +7606,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:817 msgid "" -"Implement an automatic subscription-based blacklist controlled by a " -"single individual or group.\n" -"This would essentially implement a portion of the Tor \"consensus\" " -"model.\n" -"Unfortunately it would also give a single individual or group the power " -"to\n" +"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n" +"This would essentially implement a portion of the Tor \"consensus\" model.\n" +"Unfortunately it would also give a single individual or group the power to\n" "block participation of any particular router or IP in the network,\n" "or even to completely shutdown or destroy the entire network." msgstr "" @@ -8559,25 +7625,19 @@ msgstr "" #, python-format msgid "" "An attacker may mount a Sybil attack\n" -"by creating a small number (8-15) of floodfill routers clustered closely " -"in the keyspace,\n" +"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n" "and distribute the RouterInfos for these routers widely.\n" -"Then, all lookups and stores for a key in that keyspace would be directed" -"\n" +"Then, all lookups and stores for a key in that keyspace would be directed\n" "to one of the attacker's routers.\n" -"If successful, this could be an effective DOS attack on a particular I2P " -"Site, for example." +"If successful, this could be an effective DOS attack on a particular I2P Site, for example." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:842 msgid "" -"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key," -"\n" -"an attacker must use a brute-force method to repeatedly generate router " -"hashes\n" +"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n" +"an attacker must use a brute-force method to repeatedly generate router hashes\n" "until he has enough that are sufficiently close to the key.\n" -"The amount of computational power required for this, which is dependent " -"on network\n" +"The amount of computational power required for this, which is dependent on network\n" "size, is unknown." msgstr "" @@ -8585,14 +7645,10 @@ msgstr "" msgid "" "As a partial defense against this attack,\n" "the algorithm used to determine Kademlia \"closeness\" varies over time.\n" -"Rather than using the Hash of the key (i.e. H(k)) to determine closeness," -"\n" -"we use the Hash of the key appended with the current date string, i.e. " -"H(k + YYYYMMDD).\n" -"A function called the \"routing key generator\" does this, which " -"transforms the original key into a \"routing key\".\n" -"In other words, the entire netdb keyspace \"rotates\" every day at UTC " -"midnight.\n" +"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n" +"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n" +"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n" +"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n" "Any partial-keyspace attack would have to be regenerated every day, for\n" "after the rotation, the attacking routers would no longer be close\n" "to the target key, or to each other." @@ -8601,8 +7657,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:862 msgid "" "This attack becomes more difficult as the network size grows.\n" -"However, recent research demonstrates that the keyspace rotation is not " -"particularly effective.\n" +"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n" "An attacker can precompute numerous router hashes in advance,\n" "and only a few routers are sufficient to \"eclipse\" a portion\n" "of the keyspace within a half hour after rotation." @@ -8610,11 +7665,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:870 msgid "" -"One consequence of daily keyspace rotation is that the distributed " -"network database\n" +"One consequence of daily keyspace rotation is that the distributed network database\n" "may become unreliable for a few minutes after the rotation --\n" -"lookups will fail because the new \"closest\" router has not received a " -"store yet.\n" +"lookups will fail because the new \"closest\" router has not received a store yet.\n" "The extent of the issue, and methods for mitigation\n" "(for example netdb \"handoffs\" at midnight)\n" "are a topic for further study." @@ -8677,24 +7730,19 @@ msgstr "" #, python-format msgid "" "See also lookup\n" -"(Reference: Hashing it out in Public Sections " -"2.2-2.3 for terms below in italics)" +"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:926 msgid "" -"Similar to a bootstrap attack, an attacker using a floodfill router could" -" attempt to \"steer\"\n" -"peers to a subset of routers controlled by him by returning their " -"references." +"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n" +"peers to a subset of routers controlled by him by returning their references." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:931 msgid "" -"This is unlikely to work via exploration, because exploration is a low-" -"frequency task.\n" -"Routers acquire a majority of their peer references through normal tunnel" -" building activity.\n" +"This is unlikely to work via exploration, because exploration is a low-frequency task.\n" +"Routers acquire a majority of their peer references through normal tunnel building activity.\n" "Exploration results are generally limited to a few router hashes,\n" "and each exploration query is directed to a random floodfill router." msgstr "" @@ -8706,18 +7754,13 @@ msgid "" "For floodfill router references returned in a\n" "I2NP DatabaseSearchReplyMessage\n" "response to a lookup,\n" -"these references are followed if they are closer (or the next closest) to" -" the lookup key.\n" +"these references are followed if they are closer (or the next closest) to the lookup key.\n" "The requesting router does not trust that the references are\n" "closer to the key (i.e. they are verifiably correct.\n" -"The lookup also does not stop when no closer key is found, but continues " -"by querying the\n" -"next-closet node, until the timeout or maximum number of queries is " -"reached.\n" -"This prevents a malicious floodfill from black-holing a part of the key " -"space.\n" -"Also, the daily keyspace rotation requires an attacker to regenerate a " -"router info\n" +"The lookup also does not stop when no closer key is found, but continues by querying the\n" +"next-closet node, until the timeout or maximum number of queries is reached.\n" +"This prevents a malicious floodfill from black-holing a part of the key space.\n" +"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n" "within the desired key space region.\n" "This design ensures that the query capture attack described in\n" "Hashing it out in Public\n" @@ -8755,43 +7798,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:973 #, python-format msgid "" -"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used " -"by Torsk and NISAN.\n" -"At first glance, these do not appear to apply to I2P. First, the use of " -"DHT by Torsk and NISAN\n" -"is significantly different from that in I2P. Second, I2P's network " -"database lookups are only\n" -"loosely correlated to the peer " -"selection and\n" -"tunnel building processes; only " -"previously-known peers\n" +"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n" +"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n" +"is significantly different from that in I2P. Second, I2P's network database lookups are only\n" +"loosely correlated to the peer selection and\n" +"tunnel building processes; only previously-known peers\n" "are used for tunnels.\n" "Also, peer selection is unrelated to any notion of DHT key-closeness." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:984 msgid "" -"Some of this may actually be more interesting when the I2P network gets " -"much larger.\n" -"Right now, each router knows a large proportion of the network, so " -"looking up a particular\n" -"Router Info in the network database is not strongly indicative of a " -"future intent to use\n" -"that router in a tunnel. Perhaps when the network is 100 times larger, " -"the lookup may be\n" -"more correlative. Of course, a larger network makes a Sybil attack that " -"much harder." +"Some of this may actually be more interesting when the I2P network gets much larger.\n" +"Right now, each router knows a large proportion of the network, so looking up a particular\n" +"Router Info in the network database is not strongly indicative of a future intent to use\n" +"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n" +"more correlative. Of course, a larger network makes a Sybil attack that much harder." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:992 #, python-format msgid "" -"However, the general issue of DHT information leakage in I2P needs " -"further investigation.\n" -"The floodfill routers are in a position to observe queries and gather " -"information.\n" -"Certainly, at a level of f = 0.2 (20% malicious nodes, as " -"specifed in the paper)\n" +"However, the general issue of DHT information leakage in I2P needs further investigation.\n" +"The floodfill routers are in a position to observe queries and gather information.\n" +"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n" "we expect that many of the Sybil threats we describe\n" "(here,\n" "here and\n" @@ -8826,11 +7856,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:10 #, python-format msgid "" -"Peer profiling is the process of collecting data based on the " -"observed performance\n" +"Peer profiling is the process of collecting data based on the observed performance\n" "of other routers or peers, and classifying those peers into groups.\n" -"Profiling does not use any claimed performance data published by " -"the peer itself\n" +"Profiling does not use any claimed performance data published by the peer itself\n" "in the network database." msgstr "" @@ -8845,8 +7873,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:20 #, python-format msgid "" -"Choosing peers from the set of floodfill routers to use for network " -"database storage and queries,\n" +"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n" "which is discussed on the network database page" msgstr "" @@ -8859,11 +7886,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:28 msgid "" "Peer selection is the process of choosing which routers\n" -"on the network we want to relay our messages to go through (which peers " -"will we \n" +"on the network we want to relay our messages to go through (which peers will we \n" "ask to join our tunnels). To accomplish this, we keep track of how each\n" -"peer performs (the peer's \"profile\") and use that data to estimate how" -" \n" +"peer performs (the peer's \"profile\") and use that data to estimate how \n" "fast they are, how often they will be able to accept our requests, and \n" "whether they seem to be overloaded or otherwise unable to perform what\n" "they agree to reliably." @@ -8873,8 +7898,7 @@ msgstr "" #, python-format msgid "" "Unlike some other anonymous networks, in I2P,\n" -"claimed bandwidth is untrusted and is only used to avoid those " -"peers\n" +"claimed bandwidth is untrusted and is only used to avoid those peers\n" "advertising very low bandwidth insufficient for routing tunnels.\n" "All peer selection is done through profiling.\n" "This prevents simple attacks based on peers claiming high bandwidth\n" @@ -8886,10 +7910,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:50 msgid "" -"Peer selection is done quite frequently, as a router may maintain a large" -" number\n" -"of client and exploratory tunnels, and a tunnel lifetime is only 10 " -"minutes." +"Peer selection is done quite frequently, as a router may maintain a large number\n" +"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:56 @@ -8900,11 +7922,9 @@ msgstr "" #, python-format msgid "" "For more information see the paper\n" -"Peer Profiling and Selection in the I2P Anonymous " -"Network\n" +"Peer Profiling and Selection in the I2P Anonymous Network\n" "presented at PET-CON 2009.1.\n" -"See below for notes on minor changes since the " -"paper was published." +"See below for notes on minor changes since the paper was published." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:65 @@ -8914,30 +7934,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:66 #, python-format msgid "" -"Each peer has a set of data points collected about them, including " -"statistics \n" -"about how long it takes for them to reply to a network database query, " -"how \n" -"often their tunnels fail, and how many new peers they are able to " -"introduce \n" -"us to, as well as simple data points such as when we last heard from them" -" or\n" -"when the last communication error occurred. The specific data points " -"gathered\n" +"Each peer has a set of data points collected about them, including statistics \n" +"about how long it takes for them to reply to a network database query, how \n" +"often their tunnels fail, and how many new peers they are able to introduce \n" +"us to, as well as simple data points such as when we last heard from them or\n" +"when the last communication error occurred. The specific data points gathered\n" "can be found in the code." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:75 msgid "" -"Profiles are fairly small, a few KB. To control memory usage, the profile" -" expiration time\n" +"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n" "lessens as the number of profiles grows.\n" -"Profiles are kept in memory until router shutdown, when they are written " -"to disk.\n" -"At startup, the profiles are read so the router need not reinitialize all" -" profiles,\n" -"thus allowing a router to quickly re-integrate into the network after " -"startup." +"Profiles are kept in memory until router shutdown, when they are written to disk.\n" +"At startup, the profiles are read so the router need not reinitialize all profiles,\n" +"thus allowing a router to quickly re-integrate into the network after startup." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:85 @@ -8947,10 +7958,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:86 msgid "" "While the profiles themselves can be considered a summary of a peer's \n" -"performance, to allow for effective peer selection we break each summary " -"down \n" -"into four simple values, representing the peer's speed, its capacity, how" -" well \n" +"performance, to allow for effective peer selection we break each summary down \n" +"into four simple values, representing the peer's speed, its capacity, how well \n" "integrated into the network it is, and whether it is failing." msgstr "" @@ -8962,8 +7971,7 @@ msgstr "سرعة" msgid "" "The speed calculation\n" "simply goes through the profile and estimates how much data we can\n" -"send or receive on a single tunnel through the peer in a minute. For " -"this estimate it just looks at\n" +"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n" "performance in the previous minute." msgstr "" @@ -8975,13 +7983,11 @@ msgstr "القدرة" msgid "" "The capacity calculation\n" "simply goes through the profile and estimates how many tunnels the peer\n" -"would agree to participate in over a given time period. For this " -"estimate it looks at \n" +"would agree to participate in over a given time period. For this estimate it looks at \n" "how many tunnel build requests\n" "the peer has accepted, rejected, and dropped, and how many\n" "of the agreed-to tunnels later failed.\n" -"While the calculation is time-weighted so that recent activity counts " -"more than later activity,\n" +"While the calculation is time-weighted so that recent activity counts more than later activity,\n" "statistics up to 48 hours old may be included." msgstr "" @@ -8989,10 +7995,8 @@ msgstr "" msgid "" "Recognizing and avoiding unreliable and unreachable\n" "peers is critically important.\n" -"Unfortunately, as the tunnel building and testing require the " -"participation of several peers,\n" -"it is difficult to positively identify the cause of a dropped build " -"request or test failure.\n" +"Unfortunately, as the tunnel building and testing require the participation of several peers,\n" +"it is difficult to positively identify the cause of a dropped build request or test failure.\n" "The router assigns a probability of failure to each of the\n" "peers, and uses that probability in the capacity calculation.\n" "Drops and test failures are weighted much higher than rejections." @@ -9004,10 +8008,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:124 msgid "" -"As mentioned above, we drill through each peer's profile to come up with " -"a \n" -"few key calculations, and based upon those, we organize each peer into " -"three\n" +"As mentioned above, we drill through each peer's profile to come up with a \n" +"few key calculations, and based upon those, we organize each peer into three\n" "groups - fast, high capacity, and standard." msgstr "" @@ -9017,15 +8019,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:134 msgid "" -"A peer is considered \"high capacity\" if its capacity calculation meets " -"or \n" +"A peer is considered \"high capacity\" if its capacity calculation meets or \n" "exceeds the median of all peers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:138 msgid "" -"A peer is considered \"fast\" if they are already \"high capacity\" and " -"their \n" +"A peer is considered \"fast\" if they are already \"high capacity\" and their \n" "speed calculation meets or exceeds the median of all peers." msgstr "" @@ -9051,25 +8051,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:156 msgid "" "The fast group is limited to 30 peers.\n" -"If there would be more, only the ones with the highest speed rating are " -"placed in the group." +"If there would be more, only the ones with the highest speed rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:160 msgid "" -"The high capacity group is limited to 75 peers (including the fast group)" -"\n" -"If there would be more, only the ones with the highest capacity rating " -"are placed in the group." +"The high capacity group is limited to 75 peers (including the fast group)\n" +"If there would be more, only the ones with the highest capacity rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:164 msgid "" -"The standard group has no fixed limit, but is somewhat smaller than the " -"number of RouterInfos\n" +"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n" "stored in the local network database.\n" -"On an active router in today's network, there may be about 1000 " -"RouterInfos and 500 peer profiles\n" +"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n" "(including those in the fast and high capacity groups)" msgstr "" @@ -9085,16 +8080,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:177 msgid "" -"The groups tend to be fairly stable, that is, there is not much \"churn\"" -" in the rankings\n" +"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n" "at each recalculation.\n" -"Peers in the fast and high capacity groups get more tunnels build through" -" them, which increases their speed and capacity ratings,\n" +"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n" "which reinforces their presence in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:188 -msgid "The router selects peers from the above groups to build tunnels through." +msgid "" +"The router selects peers from the above groups to build tunnels through." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:193 @@ -9103,19 +8097,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:194 msgid "" -"Client tunnels are used for application traffic, such as for HTTP proxies" -" and web servers." +"Client tunnels are used for application traffic, such as for HTTP proxies " +"and web servers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:198 msgid "" -"To reduce the susceptibility to some attacks,\n" +"To reduce the susceptibility to some attacks,\n" "and increase performance,\n" -"peers for building client tunnels are chosen randomly from the smallest " -"group, which is the \"fast\" group.\n" -"There is no bias toward selecting peers that were previously participants" -" in a tunnel for the same client." +"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n" +"There is no bias toward selecting peers that were previously participants in a tunnel for the same client." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:206 @@ -9124,35 +8115,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:207 msgid "" -"Exploratory tunnels are used for router administrative purposes, such as " -"network database traffic\n" +"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n" "and testing client tunnels.\n" -"Exploratory tunnels are also used to contact previously unconnected " -"routers, which is why\n" +"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n" "they are called \"exploratory\".\n" "These tunnels are usually low-bandwidth." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:215 msgid "" -"Peers for building exploratory tunnels are generally chosen randomly from" -" the standard group.\n" -"If the success rate of these build attempts is low compared to the client" -" tunnel build success rate,\n" -"the router will select a weighted average of peers randomly from the high" -" capacity group instead.\n" -"This helps maintain a satisfactory build success rate even when network " -"performance is poor.\n" -"There is no bias toward selecting peers that were previously participants" -" in an exploratory tunnel." +"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n" +"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n" +"the router will select a weighted average of peers randomly from the high capacity group instead.\n" +"This helps maintain a satisfactory build success rate even when network performance is poor.\n" +"There is no bias toward selecting peers that were previously participants in an exploratory tunnel." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:223 msgid "" -"As the standard group includes a very large subset of all peers the " -"router knows about,\n" -"exploratory tunnels are essentially built through a random selection of " -"all peers,\n" +"As the standard group includes a very large subset of all peers the router knows about,\n" +"exploratory tunnels are essentially built through a random selection of all peers,\n" "until the build success rate becomes too low." msgstr "" @@ -9162,8 +8144,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:232 msgid "" -"To prevent some simple attacks, and for performance, there are the " -"following restrictions:" +"To prevent some simple attacks, and for performance, there are the following" +" restrictions:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:236 @@ -9172,8 +8154,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:239 msgid "" -"A peer may participate in a maximum of 33% of all tunnels created by " -"the router." +"A peer may participate in a maximum of 33% of all tunnels created by the" +" router." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:242 @@ -9194,18 +8176,18 @@ msgid "" "Peers are ordered within tunnels to\n" "to deal with the predecessor attack\n" "(2008 update).\n" -"More information is on the tunnel " -"page." +"More information is on the tunnel page." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:268 -msgid "Continue to analyze an tune speed and capacity calculations as necessary" +msgid "" +"Continue to analyze an tune speed and capacity calculations as necessary" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:271 msgid "" -"Implement a more aggressive ejection strategy if necessary to control " -"memory usage as the network grows" +"Implement a more aggressive ejection strategy if necessary to control memory" +" usage as the network grows" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:274 @@ -9220,10 +8202,8 @@ msgstr "" #, python-format msgid "" "For those reading the paper\n" -"Peer Profiling and Selection in the I2P Anonymous " -"Network,\n" -"please keep in mind the following minor changes in I2P since the paper's " -"publication:" +"Peer Profiling and Selection in the I2P Anonymous Network,\n" +"please keep in mind the following minor changes in I2P since the paper's publication:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:289 @@ -9289,24 +8269,18 @@ msgstr "التشفير" #: i2p2www/pages/site/docs/how/tech-intro.html:21 msgid "" "I2P is a scalable, self organizing, resilient packet switched anonymous \n" -"network layer, upon which any number of different anonymity or security " -"conscious \n" -"applications can operate. Each of these applications may make their own " -"anonymity, \n" -"latency, and throughput tradeoffs without worrying about the proper " -"implementation \n" -"of a free route mixnet, allowing them to blend their activity with the " -"larger \n" +"network layer, upon which any number of different anonymity or security conscious \n" +"applications can operate. Each of these applications may make their own anonymity, \n" +"latency, and throughput tradeoffs without worrying about the proper implementation \n" +"of a free route mixnet, allowing them to blend their activity with the larger \n" "anonymity set of users already running on top of I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:30 msgid "" -"Applications available already provide the full range of typical Internet" -" activities -\n" +"Applications available already provide the full range of typical Internet activities -\n" "anonymous web browsing, web hosting, chat, file sharing, e-mail,\n" -"blogging and content syndication, newsgroups, as well as several other " -"applications under development." +"blogging and content syndication, newsgroups, as well as several other applications under development." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:36 @@ -9319,29 +8293,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:38 msgid "" -"File sharing: I2PSnark, Robert, iMule, \n" -"I2Phex, PyBit, I2P-bt\n" +"File sharing: I2PSnark, Robert, iMule, \n" +"I2Phex, PyBit, I2P-bt\n" "and others." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:43 msgid "" -"E-mail: susimail and I2P-Bote." +"E-mail: susimail and I2P-Bote." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:44 msgid "" -"Blog: using e.g. the pebble plugin or the distributed blogging software " -"Syndie." +"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:45 msgid "" -"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS " -"cloud over I2P." +"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud " +"over I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:46 @@ -9350,77 +8322,47 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:49 msgid "" -"Unlike web sites hosted within content distribution networks like Freenet \n" -"or GNUnet, the services hosted" -" on \n" -"I2P are fully interactive - there are traditional web-style search " -"engines, \n" -"bulletin boards, blogs you can comment on, database driven sites, and " -"bridges \n" -"to query static systems like Freenet without needing to install it " -"locally." +"Unlike web sites hosted within content distribution networks like Freenet \n" +"or GNUnet, the services hosted on \n" +"I2P are fully interactive - there are traditional web-style search engines, \n" +"bulletin boards, blogs you can comment on, database driven sites, and bridges \n" +"to query static systems like Freenet without needing to install it locally." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:57 msgid "" "With all of these anonymity enabled applications, I2P takes on the role \n" -"of the message oriented middleware - applications say that they want to " -"send \n" -"some data to a cryptographic identifier (a \"destination\") and I2P takes" -" care \n" -"of making sure it gets there securely and anonymously. I2P also bundles a" -" \n" -"simple streaming library to allow I2P's " -"anonymous \n" -"best-effort messages to transfer as reliable, in-order streams, " -"transparently \n" -"offering a TCP based congestion control algorithm tuned for the high " -"bandwidth \n" -"delay product of the network. While there have been several simple SOCKS " -"proxies \n" -"available to tie existing applications into the network, their value has " -"been \n" -"limited as nearly every application routinely exposes what, in an " -"anonymous \n" -"context, is sensitive information. The only safe way to go is to fully " -"audit \n" -"an application to ensure proper operation and to assist in that we " -"provide \n" -"a series of APIs in various languages which can be used to make the most " -"out \n" +"of the message oriented middleware - applications say that they want to send \n" +"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n" +"of making sure it gets there securely and anonymously. I2P also bundles a \n" +"simple streaming library to allow I2P's anonymous \n" +"best-effort messages to transfer as reliable, in-order streams, transparently \n" +"offering a TCP based congestion control algorithm tuned for the high bandwidth \n" +"delay product of the network. While there have been several simple SOCKS proxies \n" +"available to tie existing applications into the network, their value has been \n" +"limited as nearly every application routinely exposes what, in an anonymous \n" +"context, is sensitive information. The only safe way to go is to fully audit \n" +"an application to ensure proper operation and to assist in that we provide \n" +"a series of APIs in various languages which can be used to make the most out \n" "of the network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:74 #, python-format msgid "" -"I2P is not a research project - academic, commercial, or governmental, " -"but \n" -"is instead an engineering effort aimed at doing whatever is necessary to " -"provide \n" -"a sufficient level of anonymity to those who need it. It has been in " -"active \n" -"development since early 2003 with one full time developer and a dedicated" -" \n" -"group of part time contributors from all over the world. All of the work " -"done \n" -"on I2P is open source and freely available on the website, \n" -"with the majority of the code released outright into the public domain, " -"though \n" -"making use of a few cryptographic routines under BSD-style licenses. The " -"people \n" -"working on I2P do not control what people release client applications " -"under, \n" -"and there are several GPL'ed applications available (I2PTunnel, \n" -"susimail, I2PSnark, I2P-" -"Bote, \n" +"I2P is not a research project - academic, commercial, or governmental, but \n" +"is instead an engineering effort aimed at doing whatever is necessary to provide \n" +"a sufficient level of anonymity to those who need it. It has been in active \n" +"development since early 2003 with one full time developer and a dedicated \n" +"group of part time contributors from all over the world. All of the work done \n" +"on I2P is open source and freely available on the website, \n" +"with the majority of the code released outright into the public domain, though \n" +"making use of a few cryptographic routines under BSD-style licenses. The people \n" +"working on I2P do not control what people release client applications under, \n" +"and there are several GPL'ed applications available (I2PTunnel, \n" +"susimail, I2PSnark, I2P-Bote, \n" "I2Phex and others.).\n" -"Funding for I2P comes entirely from " -"donations,\n" +"Funding for I2P comes entirely from donations,\n" "and does not receive any tax breaks in any jurisdiction at this time,\n" "as many of the developers are themselves anonymous." msgstr "" @@ -9431,40 +8373,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:94 msgid "" -"To understand I2P's operation, it is essential to understand a few key " -"concepts. \n" -"First, I2P makes a strict separation between the software participating " -"in \n" -"the network (a \"router\") and the anonymous endpoints (\"destinations\")" -" associated \n" -"with individual applications. The fact that someone is running I2P is not" -" \n" -"usually a secret. What is hidden is information on what the user is " -"doing, \n" -"if anything at all, as well as what router a particular destination is " -"connected \n" -"to. End users will typically have several local destinations on their " -"router \n" -"- for instance, one proxying in to IRC servers, another supporting the " -"user's \n" -"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, " -"another for \n" +"To understand I2P's operation, it is essential to understand a few key concepts. \n" +"First, I2P makes a strict separation between the software participating in \n" +"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n" +"with individual applications. The fact that someone is running I2P is not \n" +"usually a secret. What is hidden is information on what the user is doing, \n" +"if anything at all, as well as what router a particular destination is connected \n" +"to. End users will typically have several local destinations on their router \n" +"- for instance, one proxying in to IRC servers, another supporting the user's \n" +"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n" "torrents, etc." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:107 msgid "" "Another critical concept to understand is the \"tunnel\".\n" -"A tunnel is a directed path through an explicitly selected list of " -"routers.\n" -"Layered encryption is used, so each of the routers can only decrypt a " -"single layer.\n" +"A tunnel is a directed path through an explicitly selected list of routers.\n" +"Layered encryption is used, so each of the routers can only decrypt a single layer.\n" "The decrypted information contains the IP of the next router, along with\n" "the encrypted information to be forwarded.\n" -"Each tunnel has a starting point (the first router, also known as " -"\"gateway\")\n" -"and an end point. Messages can be sent only in one way. To send messages " -"back,\n" +"Each tunnel has a starting point (the first router, also known as \"gateway\")\n" +"and an end point. Messages can be sent only in one way. To send messages back,\n" "another tunnel is required." msgstr "" @@ -9484,15 +8413,12 @@ msgid "" "while \"inbound\" tunnels bring messages to the tunnel creator.\n" "Combining these two tunnels allows users to send messages to each other.\n" "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n" -"while the receiver (\"Bob\" in the above image) creates an inbound " -"tunnel.\n" -"The gateway of an inbound tunnel can receive messages from any other user" -"\n" +"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n" +"The gateway of an inbound tunnel can receive messages from any other user\n" "and will send them on until the endpoint (\"Bob\").\n" "The endpoint of the outbound tunnel will need to send the message\n" "on to the gateway of the inbound tunnel.\n" -"To do this, the sender (\"Alice\") adds instructions to her encrypted " -"message.\n" +"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n" "Once the endpoint of the outbound tunnel decrypts the message,\n" "it will have instructions to forward the message to the correct\n" "inbound gateway (the gateway to \"Bob\")." @@ -9500,25 +8426,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:140 msgid "" -"A third critical concept to understand is I2P's \"network " -"database\" (or \"netDb\") \n" -"- a pair of algorithms used to share network metadata. The two types of " -"metadata \n" -"carried are \"routerInfo\" and \"leaseSets\" - the " -"routerInfo gives routers the \n" -"data necessary for contacting a particular router (their public keys, " -"transport \n" -"addresses, etc), while the leaseSet gives routers the information " -"necessary \n" -"for contacting a particular destination. A leaseSet contains a number of " -"\"leases\".\n" -"Each of this leases specifies a tunnel gateway, which allows reaching a " -"specific destination.\n" +"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n" +"- a pair of algorithms used to share network metadata. The two types of metadata \n" +"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n" +"data necessary for contacting a particular router (their public keys, transport \n" +"addresses, etc), while the leaseSet gives routers the information necessary \n" +"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n" +"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n" "The full information contained in a lease:" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:151 -msgid "Inbound gateway for a tunnel that allows reaching a specific destination." +msgid "" +"Inbound gateway for a tunnel that allows reaching a specific destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:152 @@ -9533,10 +8453,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:155 msgid "" -"Routers themselves send their routerInfo to the netDb directly, while " -"leaseSets are sent through outbound tunnels\n" -"(leaseSets need to be sent anonymously, to avoid correlating a router " -"with his leaseSets)." +"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" +"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:160 @@ -9547,13 +8465,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" -"To build up her own inbound and outbound tunnels, Alice does a lookup in " -"the netDb to collect routerInfo.\n" +"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" -"She can then send a build message to the first hop, requesting the " -"construction of a tunnel and asking\n" -"that router to send the construction message onward, until the tunnel has" -" been constructed." +"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" +"that router to send the construction message onward, until the tunnel has been constructed." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:171 @@ -9570,30 +8485,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" -"When Alice wants to send a message to Bob, she first does a lookup in the" -" \n" -"netDb to find Bob's leaseSet, giving her his current inbound tunnel " -"gateways. \n" -"She then picks one of her outbound tunnels and sends the message down it " -"with \n" -"instructions for the outbound tunnel's endpoint to forward the message on" -" \n" -"to one of Bob's inbound tunnel gateways. When the outbound tunnel " -"endpoint \n" -"receives those instructions, it forwards the message as requested, and " -"when \n" -"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel" -" \n" -"to Bob's router. If Alice wants Bob to be able to reply to the message, " -"she \n" -"needs to transmit her own destination explicitly as part of the message " -"itself.\n" -"This can be done by introducing a higher-level layer, which is done in " -"the\n" +"When Alice wants to send a message to Bob, she first does a lookup in the \n" +"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n" +"She then picks one of her outbound tunnels and sends the message down it with \n" +"instructions for the outbound tunnel's endpoint to forward the message on \n" +"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n" +"receives those instructions, it forwards the message as requested, and when \n" +"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n" +"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n" +"needs to transmit her own destination explicitly as part of the message itself.\n" +"This can be done by introducing a higher-level layer, which is done in the\n" "streaming library.\n" "Alice may also cut down on the response time by bundling her most \n" -"recent LeaseSet with the message so that Bob doesn't need to do a netDb " -"lookup \n" +"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." msgstr "" @@ -9611,208 +8515,126 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:200 msgid "" -"While the tunnels themselves have layered encryption to prevent " -"unauthorized \n" -"disclosure to peers inside the network (as the transport layer itself " -"does \n" -"to prevent unauthorized disclosure to peers outside the network), it is " -"necessary \n" -"to add an additional end to end layer of encryption to hide the message " -"from \n" -"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n" -"encryption\" lets Alice's router wrap up multiple messages into a " -"single \n" -"\"garlic message\", encrypted to a particular public key so that " -"intermediary \n" -"peers cannot determine either how many messages are within the garlic, " -"what \n" -"those messages say, or where those individual cloves are destined. For " -"typical \n" -"end to end communication between Alice and Bob, the garlic will be " -"encrypted \n" -"to the public key published in Bob's leaseSet, allowing the message to be" -" \n" +"While the tunnels themselves have layered encryption to prevent unauthorized \n" +"disclosure to peers inside the network (as the transport layer itself does \n" +"to prevent unauthorized disclosure to peers outside the network), it is necessary \n" +"to add an additional end to end layer of encryption to hide the message from \n" +"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n" +"encryption\" lets Alice's router wrap up multiple messages into a single \n" +"\"garlic message\", encrypted to a particular public key so that intermediary \n" +"peers cannot determine either how many messages are within the garlic, what \n" +"those messages say, or where those individual cloves are destined. For typical \n" +"end to end communication between Alice and Bob, the garlic will be encrypted \n" +"to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" -"Another important fact to keep in mind is that I2P is entirely message " -"based \n" -"and that some messages may be lost along the way. Applications using I2P " -"can \n" -"use the message oriented interfaces and take care of their own congestion" -" \n" -"control and reliability needs, but most would be best served by reusing " -"the \n" -"provided streaming library to view I2P as " -"a streams \n" +"Another important fact to keep in mind is that I2P is entirely message based \n" +"and that some messages may be lost along the way. Applications using I2P can \n" +"use the message oriented interfaces and take care of their own congestion \n" +"control and reliability needs, but most would be best served by reusing the \n" +"provided streaming library to view I2P as a streams \n" "based network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" "Both inbound and outbound tunnels work along similar principles.\n" -"The tunnel gateway accumulates a number of tunnel messages, eventually " -"preprocessing \n" -"them into something for tunnel delivery. Next, the gateway encrypts that " -"preprocessed \n" -"data and forwards it to the first hop. That peer and subsequent tunnel " -"participants \n" -"add on a layer of encryption after verifying that it isn't a duplicate " -"before \n" -"forward it on to the next peer. Eventually, the message arrives at the " -"endpoint \n" -"where the messages are split out again and forwarded on as requested. The" -" \n" -"difference arises in what the tunnel's creator does - for inbound " -"tunnels, \n" -"the creator is the endpoint and they simply decrypt all of the layers " -"added, \n" -"while for outbound tunnels, the creator is the gateway and they pre-" -"decrypt \n" -"all of the layers so that after all of the layers of per-hop encryption " -"are \n" +"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n" +"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n" +"data and forwards it to the first hop. That peer and subsequent tunnel participants \n" +"add on a layer of encryption after verifying that it isn't a duplicate before \n" +"forward it on to the next peer. Eventually, the message arrives at the endpoint \n" +"where the messages are split out again and forwarded on as requested. The \n" +"difference arises in what the tunnel's creator does - for inbound tunnels, \n" +"the creator is the endpoint and they simply decrypt all of the layers added, \n" +"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" +"all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" -"The choice of specific peers to pass on messages as well as their " -"particular \n" -"ordering is important to understanding both I2P's anonymity and " -"performance \n" -"characteristics. While the network database (below) has its own criteria " -"for \n" -"picking what peers to query and store entries on, tunnel creators may use" -" any peers \n" -"in the network in any order (and even any number of times) in a single " -"tunnel. \n" -"If perfect latency and capacity data were globally known, selection and " -"ordering \n" -"would be driven by the particular needs of the client in tandem with " -"their \n" -"threat model. Unfortunately, latency and capacity data is not trivial to " -"gather \n" -"anonymously, and depending upon untrusted peers to provide this " -"information \n" +"The choice of specific peers to pass on messages as well as their particular \n" +"ordering is important to understanding both I2P's anonymity and performance \n" +"characteristics. While the network database (below) has its own criteria for \n" +"picking what peers to query and store entries on, tunnel creators may use any peers \n" +"in the network in any order (and even any number of times) in a single tunnel. \n" +"If perfect latency and capacity data were globally known, selection and ordering \n" +"would be driven by the particular needs of the client in tandem with their \n" +"threat model. Unfortunately, latency and capacity data is not trivial to gather \n" +"anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" -"From an anonymity perspective, the simplest technique would be to pick " -"peers \n" -"randomly from the entire network, order them randomly and use those peers" -" \n" -"in that order for all eternity. From a performance perspective, the " -"simplest \n" -"technique would be to pick the fastest peers with the necessary spare " -"capacity, \n" -"spreading the load across different peers to handle transparent failover," -" \n" -"and to rebuild the tunnel whenever capacity information changes. While " -"the \n" -"former is both brittle and inefficient, the later requires inaccessible " -"information \n" -"and offers insufficient anonymity. I2P is instead working on offering a " -"range \n" -"of peer selection strategies, coupled with anonymity aware measurement " -"code \n" +"From an anonymity perspective, the simplest technique would be to pick peers \n" +"randomly from the entire network, order them randomly and use those peers \n" +"in that order for all eternity. From a performance perspective, the simplest \n" +"technique would be to pick the fastest peers with the necessary spare capacity, \n" +"spreading the load across different peers to handle transparent failover, \n" +"and to rebuild the tunnel whenever capacity information changes. While the \n" +"former is both brittle and inefficient, the later requires inaccessible information \n" +"and offers insufficient anonymity. I2P is instead working on offering a range \n" +"of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" -"As a base, I2P is constantly profiling the peers with which it interacts" -" \n" -"with by measuring their indirect behavior - for instance, when a peer " -"responds \n" -"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in " -"the \n" -"profiles for all of the routers involved in the two tunnels (inbound and " -"outbound) \n" -"through which the request and response passed, as well as the queried " -"peer's \n" -"profile. Direct measurement, such as transport layer latency or " -"congestion, \n" -"is not used as part of the profile, as it can be manipulated and " -"associated \n" -"with the measuring router, exposing them to trivial attacks. While " -"gathering \n" -"these profiles, a series of calculations are run on each to summarize its" -" \n" -"performance - its latency, capacity to handle lots of activity, whether " -"they \n" -"are currently overloaded, and how well integrated into the network they " -"seem \n" -"to be. These calculations are then compared for active peers to organize " -"the \n" -"routers into four tiers - fast and high capacity, high capacity, not " -"failing, \n" -"and failing. The thresholds for those tiers are determined dynamically, " -"and \n" +"As a base, I2P is constantly profiling the peers with which it interacts \n" +"with by measuring their indirect behavior - for instance, when a peer responds \n" +"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n" +"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n" +"through which the request and response passed, as well as the queried peer's \n" +"profile. Direct measurement, such as transport layer latency or congestion, \n" +"is not used as part of the profile, as it can be manipulated and associated \n" +"with the measuring router, exposing them to trivial attacks. While gathering \n" +"these profiles, a series of calculations are run on each to summarize its \n" +"performance - its latency, capacity to handle lots of activity, whether they \n" +"are currently overloaded, and how well integrated into the network they seem \n" +"to be. These calculations are then compared for active peers to organize the \n" +"routers into four tiers - fast and high capacity, high capacity, not failing, \n" +"and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" -"Using this profile data, the simplest reasonable peer selection strategy " -"is to\n" -"pick peers randomly from the top tier (fast and high capacity), and this " -"is\n" -"currently deployed for client tunnels. Exploratory tunnels (used for " -"netDb and\n" -"tunnel management) pick peers randomly from the \"not failing\" tier " -"(which\n" +"Using this profile data, the simplest reasonable peer selection strategy is to\n" +"pick peers randomly from the top tier (fast and high capacity), and this is\n" +"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n" +"tunnel management) pick peers randomly from the \"not failing\" tier (which\n" "includes routers in 'better' tiers as well), allowing the peer to sample\n" -"routers more widely, in effect optimizing the peer selection through " -"randomized\n" -"hill " -"climbing. These\n" +"routers more widely, in effect optimizing the peer selection through randomized\n" +"hill climbing. These\n" "strategies alone do however leak information regarding the peers in the\n" -"router's top tier through predecessor and netDb harvesting attacks. In " -"turn,\n" -"several alternatives exist which, while not balancing the load as evenly," -" will\n" +"router's top tier through predecessor and netDb harvesting attacks. In turn,\n" +"several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" -"By picking a random key and ordering the peers according to their XOR " -"distance \n" -"from it, the information leaked is reduced in predecessor and harvesting " -"attacks \n" -"according to the peers' failure rate and the tier's churn. Another simple" -" \n" -"strategy for dealing with netDb harvesting attacks is to simply fix the " -"inbound \n" -"tunnel gateway(s) yet randomize the peers further on in the tunnels. To " -"deal \n" -"with predecessor attacks for adversaries which the client contacts, the " -"outbound \n" -"tunnel endpoints would also remain fixed. The selection of which peer to " -"fix \n" -"on the most exposed point would of course need to have a limit to the " -"duration, \n" -"as all peers fail eventually, so it could either be reactively adjusted " -"or \n" -"proactively avoided to mimic a measured mean time between failures of " -"other \n" -"routers. These two strategies can in turn be combined, using a fixed " -"exposed \n" -"peer and an XOR based ordering within the tunnels themselves. A more " -"rigid \n" -"strategy would fix the exact peers and ordering of a potential tunnel, " -"only \n" -"using individual peers if all of them agree to participate in the same " -"way \n" -"each time. This varies from the XOR based ordering in that the " -"predecessor \n" -"and successor of each peer is always the same, while the XOR only makes " -"sure \n" +"By picking a random key and ordering the peers according to their XOR distance \n" +"from it, the information leaked is reduced in predecessor and harvesting attacks \n" +"according to the peers' failure rate and the tier's churn. Another simple \n" +"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n" +"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n" +"with predecessor attacks for adversaries which the client contacts, the outbound \n" +"tunnel endpoints would also remain fixed. The selection of which peer to fix \n" +"on the most exposed point would of course need to have a limit to the duration, \n" +"as all peers fail eventually, so it could either be reactively adjusted or \n" +"proactively avoided to mimic a measured mean time between failures of other \n" +"routers. These two strategies can in turn be combined, using a fixed exposed \n" +"peer and an XOR based ordering within the tunnels themselves. A more rigid \n" +"strategy would fix the exact peers and ordering of a potential tunnel, only \n" +"using individual peers if all of them agree to participate in the same way \n" +"each time. This varies from the XOR based ordering in that the predecessor \n" +"and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." msgstr "" @@ -9821,10 +8643,8 @@ msgstr "" msgid "" "As mentioned before, I2P currently (release 0.8) includes the tiered \n" "random strategy above, with XOR-based ordering. A \n" -"more detailed discussion of the mechanics involved in tunnel operation, " -"management, \n" -"and peer selection can be found in the tunnel " -"spec." +"more detailed discussion of the mechanics involved in tunnel operation, management, \n" +"and peer selection can be found in the tunnel spec." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:326 @@ -9838,27 +8658,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" "A percentage of I2P users are appointed as 'floodfill peers'.\n" -"Currently, I2P installations that have a lot of bandwidth and are fast " -"enough,\n" -"will appoint themselves as floodfill as soon as the number of existing " -"floodfill routers\n" +"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" +"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format msgid "" -"Other I2P routers will store their data and lookup data by sending simple" -" 'store' and 'lookup' queries to the floodfills.\n" -"If a floodfill router receives a 'store' query, it will spread the " -"information to other floodfill routers\n" -"using the Kademlia " -"algorithm.\n" -"The 'lookup' queries currently function differently, to avoid an " -"important\n" +"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n" +"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n" +"using the Kademlia algorithm.\n" +"The 'lookup' queries currently function differently, to avoid an important\n" "security issue.\n" -"When a lookup is done, the floodfill router will not forward the lookup " -"to other peers,\n" +"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." msgstr "" @@ -9868,8 +8681,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" -"A RouterInfo stores information on a specific I2P router and how " -"to contact it" +"A RouterInfo stores information on a specific I2P router and how to " +"contact it" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:354 @@ -9880,14 +8693,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" -"All of this information is signed by the publishing party and verified by" -" any I2P router using or storing the information.\n" -"In addition, the data contains timing information, to avoid storage of " -"old entries and possible attacks.\n" -"This is also why I2P bundles the necessary code for maintaining the " -"correct time, occasionally querying some SNTP servers \n" -"(the pool.ntp.org round robin by" -" default)\n" +"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n" +"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n" +"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" +"(the pool.ntp.org round robin by default)\n" "and detecting skew between routers at the transport layer." msgstr "" @@ -9902,10 +8711,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:370 msgid "" "One could only want specific people to be able to reach a destination.\n" -"This is possible by not publishing the destination in the netDb. You will" -" however have to transmit the destination by other means.\n" -"An alternative are the 'encrypted leaseSets'. These leaseSets can only be" -" decoded by people with access to the decryption key." +"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" +"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:377 @@ -9914,13 +8721,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:378 msgid "" -"Bootstrapping the netDb is quite simple. Once a router manages to receive" -" a single routerInfo of a reachable peer,\n" +"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n" "it can query that router for references to other routers in the network.\n" -"Currently, a number of users post their routerInfo files to a website to " -"make this information available.\n" -"I2P automatically connects to one of these websites to gather routerInfo " -"files and bootstrap." +"Currently, a number of users post their routerInfo files to a website to make this information available.\n" +"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:386 @@ -9930,26 +8734,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:387 msgid "" "Lookups in the I2P network are not forwarded to other netDb routers.\n" -"Currently, this is not a major problem, since the network is not very " -"large.\n" -"However, as the network grows, not all routerInfo and leaseSet files will" -" be present\n" -"on each netDb router. This will cause a deterioration of the percentage " -"of successful lookups.\n" -"Because of this, refinements to the netDb will be done in the next " -"releases." +"Currently, this is not a major problem, since the network is not very large.\n" +"However, as the network grows, not all routerInfo and leaseSet files will be present\n" +"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" +"Because of this, refinements to the netDb will be done in the next releases." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" -"Communication between routers needs to provide confidentiality and " -"integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" -"is the one who should receive a given message. The particulars of how " -"routers \n" -"communicate with other routers aren't critical - three separate protocols" -" \n" +"Communication between routers needs to provide confidentiality and integrity \n" +"against external adversaries while authenticating that the router contacted \n" +"is the one who should receive a given message. The particulars of how routers \n" +"communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." msgstr "" @@ -9957,12 +8753,9 @@ msgstr "" #, python-format msgid "" "I2P started with a TCP-based protocol which \n" -"has since been disabled. Then, to accommodate the need for high degree " -"communication \n" -"(as a number of routers will end up speaking with many others), I2P moved" -" \n" -"from a TCP based transport to a UDP-based one - " -"\"Secure \n" +"has since been disabled. Then, to accommodate the need for high degree communication \n" +"(as a number of routers will end up speaking with many others), I2P moved \n" +"from a TCP based transport to a UDP-based one - \"Secure \n" "Semireliable UDP\", or \"SSU\"." msgstr "" @@ -9974,46 +8767,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" "The goal of this protocol is to provide secure, authenticated, \n" -"semireliable and unordered message delivery, exposing only a minimal " -"amount \n" -"of data easily discernible to third parties. It should support high " -"degree \n" -"communication as well as TCP-friendly congestion control and may include" -" \n" -"PMTU detection. It should be capable of efficiently moving bulk data at " -"rates \n" -"sufficient for home users. In addition, it should support techniques for " -"addressing \n" +"semireliable and unordered message delivery, exposing only a minimal amount \n" +"of data easily discernible to third parties. It should support high degree \n" +"communication as well as TCP-friendly congestion control and may include \n" +"PMTU detection. It should be capable of efficiently moving bulk data at rates \n" +"sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format msgid "" -"Following the introduction of SSU, after issues with congestion collapse" -" \n" -"appeared, a new NIO-based TCP transport called NTCP \n" -"was implemented. It is enabled by default for outbound connections only. " -"Those \n" -"who configure their NAT/firewall to allow inbound connections and specify" -" \n" -"the external host and port (dyndns/etc is ok) on /config.jsp can receive " -"inbound \n" -"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread" -" \n" +"Following the introduction of SSU, after issues with congestion collapse \n" +"appeared, a new NIO-based TCP transport called NTCP \n" +"was implemented. It is enabled by default for outbound connections only. Those \n" +"who configure their NAT/firewall to allow inbound connections and specify \n" +"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" +"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" "I2P supports multiple transports simultaneously. A particular transport \n" -"for an outbound connection is selected with \"bids\". Each transport bids" -" for \n" -"the connection and the relative value of these bids assigns the priority." -" \n" -"Transports may reply with different bids, depending on whether there is " -"already \n" +"for an outbound connection is selected with \"bids\". Each transport bids for \n" +"the connection and the relative value of these bids assigns the priority. \n" +"Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." msgstr "" @@ -10021,38 +8800,25 @@ msgstr "" #, python-format msgid "" "The current implementation ranks NTCP as the highest-priority transport \n" -"for outbound connections in most situations. SSU is enabled for both " -"outbound \n" -"and inbound connections. Your firewall and your I2P router must be " -"configured \n" -"to allow inbound NTCP connections. For further information see the NTCP \n" +"for outbound connections in most situations. SSU is enabled for both outbound \n" +"and inbound connections. Your firewall and your I2P router must be configured \n" +"to allow inbound NTCP connections. For further information see the NTCP \n" "page." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" "A bare minimum set of cryptographic primitives are combined together to \n" -"provide I2P's layered defenses against a variety of adversaries. At the " -"lowest \n" -"level, inter router communication is protected by the transport layer " -"security \n" -"- SSU encrypts each packet with AES256/CBC with both an explicit IV and " -"MAC \n" -"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a " -"2048bit \n" -"Diffie-Hellman exchange, station-to-station authentication with the other" -" \n" -"router's DSA key, plus each network message has their own hash for local " -"integrity \n" -"checking. Tunnel messages passed over the " -"transports \n" -"have their own layered AES256/CBC encryption with an explicit IV and " -"verified \n" -"at the tunnel endpoint with an additional SHA256 hash. Various other " -"messages \n" -"are passed along inside \"garlic messages\", which are encrypted with " -"ElGamal/AES+SessionTags \n" +"provide I2P's layered defenses against a variety of adversaries. At the lowest \n" +"level, inter router communication is protected by the transport layer security \n" +"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n" +"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n" +"Diffie-Hellman exchange, station-to-station authentication with the other \n" +"router's DSA key, plus each network message has their own hash for local integrity \n" +"checking. Tunnel messages passed over the transports \n" +"have their own layered AES256/CBC encryption with an explicit IV and verified \n" +"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" +"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." msgstr "" @@ -10062,51 +8828,31 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:471 msgid "" -"Garlic messages are an extension of \"onion\" layered encryption, " -"allowing \n" -"the contents of a single message to contain multiple \"cloves\" - fully " -"formed \n" -"messages alongside their own instructions for delivery. Messages are " -"wrapped \n" -"into a garlic message whenever the message would otherwise be passing in " -"cleartext \n" -"through a peer who should not have access to the information - for " -"instance, \n" -"when a router wants to ask another router to participate in a tunnel, " -"they \n" -"wrap the request inside a garlic, encrypt that garlic to the receiving " -"router's \n" -"2048bit ElGamal public key, and forward it through a tunnel. Another " -"example \n" -"is when a client wants to send a message to a destination - the sender's " -"router \n" -"will wrap up that data message (alongside some other messages) into a " -"garlic, \n" -"encrypt that garlic to the 2048bit ElGamal public key published in the " -"recipient's \n" +"Garlic messages are an extension of \"onion\" layered encryption, allowing \n" +"the contents of a single message to contain multiple \"cloves\" - fully formed \n" +"messages alongside their own instructions for delivery. Messages are wrapped \n" +"into a garlic message whenever the message would otherwise be passing in cleartext \n" +"through a peer who should not have access to the information - for instance, \n" +"when a router wants to ask another router to participate in a tunnel, they \n" +"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n" +"2048bit ElGamal public key, and forward it through a tunnel. Another example \n" +"is when a client wants to send a message to a destination - the sender's router \n" +"will wrap up that data message (alongside some other messages) into a garlic, \n" +"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" -"The \"instructions\" attached to each clove inside the encryption layer " -"includes \n" -"the ability to request that the clove be forwarded locally, to a remote " -"router, \n" -"or to a remote tunnel on a remote router. There are fields in those " -"instructions \n" -"allowing a peer to request that the delivery be delayed until a certain " -"time \n" -"or condition has been met, though they won't be honored until the nontrivial \n" -"delays are deployed. It is possible to explicitly route garlic " -"messages \n" -"any number of hops without building tunnels, or even to reroute tunnel " -"messages \n" -"by wrapping them in garlic messages and forwarding them a number of hops " -"prior \n" -"to delivering them to the next hop in the tunnel, but those techniques " -"are \n" +"The \"instructions\" attached to each clove inside the encryption layer includes \n" +"the ability to request that the clove be forwarded locally, to a remote router, \n" +"or to a remote tunnel on a remote router. There are fields in those instructions \n" +"allowing a peer to request that the delivery be delayed until a certain time \n" +"or condition has been met, though they won't be honored until the nontrivial \n" +"delays are deployed. It is possible to explicitly route garlic messages \n" +"any number of hops without building tunnels, or even to reroute tunnel messages \n" +"by wrapping them in garlic messages and forwarding them a number of hops prior \n" +"to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." msgstr "" @@ -10116,54 +8862,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:500 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" -"Session tags themselves have a very short lifetime, after which they are" -" \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"Session tags themselves have a very short lifetime, after which they are \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" -"One alternative is to transmit only a single session tag, and from that," -" \n" -"seed a deterministic PRNG for determining what tags to use or expect. By " -"keeping \n" -"this PRNG roughly synchronized between the sender and recipient (the " -"recipient \n" -"precomputes a window of the next e.g. 50 tags), the overhead of " -"periodically \n" -"bundling a large number of tags is removed, allowing more options in the " -"space/time \n" -"tradeoff, and perhaps reducing the number of ElGamal encryptions " -"necessary. \n" -"However, it would depend upon the strength of the PRNG to provide the " -"necessary \n" -"cover against internal adversaries, though perhaps by limiting the amount" -" \n" -"of times each PRNG is used, any weaknesses can be minimized. At the " -"moment, \n" +"One alternative is to transmit only a single session tag, and from that, \n" +"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n" +"this PRNG roughly synchronized between the sender and recipient (the recipient \n" +"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n" +"bundling a large number of tags is removed, allowing more options in the space/time \n" +"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n" +"However, it would depend upon the strength of the PRNG to provide the necessary \n" +"cover against internal adversaries, though perhaps by limiting the amount \n" +"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." msgstr "" @@ -10173,12 +8900,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:563 msgid "" -"While I2P is currently functional and sufficient for many scenarios, " -"there \n" -"are several areas which require further improvement to meet the needs of " -"those \n" -"facing more powerful adversaries as well as substantial user experience " -"optimization." +"While I2P is currently functional and sufficient for many scenarios, there \n" +"are several areas which require further improvement to meet the needs of those \n" +"facing more powerful adversaries as well as substantial user experience optimization." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:569 @@ -10187,106 +8911,64 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:570 msgid "" -"I2P is an overlay network designed to be run on top of a functional " -"packet \n" -"switched network, exploiting the end to end principle to offer anonymity " -"and \n" -"security. While the Internet no longer fully embraces the end to end " -"principle\n" +"I2P is an overlay network designed to be run on top of a functional packet \n" +"switched network, exploiting the end to end principle to offer anonymity and \n" +"security. While the Internet no longer fully embraces the end to end principle\n" "(due to the usage of NAT), \n" -"I2P does require a substantial portion of the network to be reachable - " -"there \n" -"may be a number of peers along the edges running using restricted routes," -" \n" -"but I2P does not include an appropriate routing algorithm for the " -"degenerate \n" -"case where most peers are unreachable. It would, however work on top of a" -" \n" +"I2P does require a substantial portion of the network to be reachable - there \n" +"may be a number of peers along the edges running using restricted routes, \n" +"but I2P does not include an appropriate routing algorithm for the degenerate \n" +"case where most peers are unreachable. It would, however work on top of a \n" "network employing such an algorithm." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:582 msgid "" -"Restricted route operation, where there are limits to what peers are " -"reachable \n" -"directly, has several different functional and anonymity implications, " -"dependent \n" -"upon how the restricted routes are handled. At the most basic level, " -"restricted \n" -"routes exist when a peer is behind a NAT or firewall which does not allow" -" \n" -"inbound connections. This was largely addressed in I2P 0.6.0.6 by " -"integrating \n" -"distributed hole punching into the transport layer, allowing people " -"behind \n" -"most NATs and firewalls to receive unsolicited connections without any " -"configuration. \n" -"However, this does not limit the exposure of the peer's IP address to " -"routers \n" -"inside the network, as they can simply get introduced to the peer through" -" \n" +"Restricted route operation, where there are limits to what peers are reachable \n" +"directly, has several different functional and anonymity implications, dependent \n" +"upon how the restricted routes are handled. At the most basic level, restricted \n" +"routes exist when a peer is behind a NAT or firewall which does not allow \n" +"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n" +"distributed hole punching into the transport layer, allowing people behind \n" +"most NATs and firewalls to receive unsolicited connections without any configuration. \n" +"However, this does not limit the exposure of the peer's IP address to routers \n" +"inside the network, as they can simply get introduced to the peer through \n" "the published introducer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:595 msgid "" -"Beyond the functional handling of restricted routes, there are two levels" -" \n" -"of restricted operation that can be used to limit the exposure of one's " -"IP \n" -"address - using router-specific tunnels for communication, and offering " -"'client \n" -"routers'. For the former, routers can either build a new pool of tunnels " -"or \n" -"reuse their exploratory pool, publishing the inbound gateways to some of " -"them \n" -"as part of their routerInfo in place of their transport addresses. When a" -" \n" -"peer wants to get in touch with them, they see those tunnel gateways in " -"the \n" -"netDb and simply send the relevant message to them through one of the " -"published \n" -"tunnels. If the peer behind the restricted route wants to reply, it may " -"do \n" -"so either directly (if they are willing to expose their IP to the peer) " -"or \n" -"indirectly through their outbound tunnels. When the routers that the peer" -" \n" -"has direct connections to want to reach it (to forward tunnel messages, " -"for \n" -"instance), they simply prioritize their direct connection over the " -"published \n" -"tunnel gateway. The concept of 'client routers' simply extends the " -"restricted \n" -"route by not publishing any router addresses. Such a router would not " -"even \n" -"need to publish their routerInfo in the netDb, merely providing their " -"self \n" -"signed routerInfo to the peers that it contacts (necessary to pass the " -"router's \n" -"public keys). Both levels of restricted route operation are planned for " -"I2P \n" +"Beyond the functional handling of restricted routes, there are two levels \n" +"of restricted operation that can be used to limit the exposure of one's IP \n" +"address - using router-specific tunnels for communication, and offering 'client \n" +"routers'. For the former, routers can either build a new pool of tunnels or \n" +"reuse their exploratory pool, publishing the inbound gateways to some of them \n" +"as part of their routerInfo in place of their transport addresses. When a \n" +"peer wants to get in touch with them, they see those tunnel gateways in the \n" +"netDb and simply send the relevant message to them through one of the published \n" +"tunnels. If the peer behind the restricted route wants to reply, it may do \n" +"so either directly (if they are willing to expose their IP to the peer) or \n" +"indirectly through their outbound tunnels. When the routers that the peer \n" +"has direct connections to want to reach it (to forward tunnel messages, for \n" +"instance), they simply prioritize their direct connection over the published \n" +"tunnel gateway. The concept of 'client routers' simply extends the restricted \n" +"route by not publishing any router addresses. Such a router would not even \n" +"need to publish their routerInfo in the netDb, merely providing their self \n" +"signed routerInfo to the peers that it contacts (necessary to pass the router's \n" +"public keys). Both levels of restricted route operation are planned for I2P \n" "2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:617 msgid "" -"There are tradeoffs for those behind restricted routes, as they would " -"likely \n" -"participate in other people's tunnels less frequently, and the routers " -"which \n" -"they are connected to would be able to infer traffic patterns that would " -"not \n" -"otherwise be exposed. On the other hand, if the cost of that exposure is " -"less \n" -"than the cost of an IP being made available, it may be worthwhile. This, " -"of \n" -"course, assumes that the peers that the router behind a restricted route " -"contacts \n" -"are not hostile - either the network is large enough that the probability" -" \n" -"of using a hostile peer to get connected is small enough, or trusted (and" -" \n" +"There are tradeoffs for those behind restricted routes, as they would likely \n" +"participate in other people's tunnels less frequently, and the routers which \n" +"they are connected to would be able to infer traffic patterns that would not \n" +"otherwise be exposed. On the other hand, if the cost of that exposure is less \n" +"than the cost of an IP being made available, it may be worthwhile. This, of \n" +"course, assumes that the peers that the router behind a restricted route contacts \n" +"are not hostile - either the network is large enough that the probability \n" +"of using a hostile peer to get connected is small enough, or trusted (and \n" "perhaps temporary) peers are used instead." msgstr "" @@ -10296,45 +8978,28 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:630 msgid "" -"Even though the bulk of I2P's initial efforts have been on low latency " -"communication, \n" -"it was designed with variable latency services in mind from the " -"beginning. \n" -"At the most basic level, applications running on top of I2P can offer the" -" \n" -"anonymity of medium and high latency communication while still blending " -"their \n" -"traffic patterns in with low latency traffic. Internally though, I2P can " -"offer \n" -"its own medium and high latency communication through the garlic " -"encryption \n" -"- specifying that the message should be sent after a certain delay, at a " -"certain \n" -"time, after a certain number of messages have passed, or another mix " -"strategy. \n" -"With the layered encryption, only the router that the clove exposed the " -"delay \n" -"request would know that the message requires high latency, allowing the " -"traffic \n" -"to blend in further with the low latency traffic. Once the transmission " -"precondition \n" -"is met, the router holding on to the clove (which itself would likely be " -"a \n" -"garlic message) simply forwards it as requested - to a router, to a " -"tunnel, \n" +"Even though the bulk of I2P's initial efforts have been on low latency communication, \n" +"it was designed with variable latency services in mind from the beginning. \n" +"At the most basic level, applications running on top of I2P can offer the \n" +"anonymity of medium and high latency communication while still blending their \n" +"traffic patterns in with low latency traffic. Internally though, I2P can offer \n" +"its own medium and high latency communication through the garlic encryption \n" +"- specifying that the message should be sent after a certain delay, at a certain \n" +"time, after a certain number of messages have passed, or another mix strategy. \n" +"With the layered encryption, only the router that the clove exposed the delay \n" +"request would know that the message requires high latency, allowing the traffic \n" +"to blend in further with the low latency traffic. Once the transmission precondition \n" +"is met, the router holding on to the clove (which itself would likely be a \n" +"garlic message) simply forwards it as requested - to a router, to a tunnel, \n" "or, most likely, to a remote client destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:647 msgid "" -"There are a substantial number of ways to exploit this capacity for high" -" \n" -"latency comm in I2P, but for the moment, doing so has been scheduled for " -"the \n" -"I2P 3.0 release. In the meantime, those requiring the anonymity that high" -" \n" -"latency comm can offer should look towards the application layer to " -"provide \n" +"There are a substantial number of ways to exploit this capacity for high \n" +"latency comm in I2P, but for the moment, doing so has been scheduled for the \n" +"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n" +"latency comm can offer should look towards the application layer to provide \n" "it." msgstr "" @@ -10368,18 +9033,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:665 msgid "" -"I2P's architecture builds on the concepts of message oriented middleware," -" \n" -"the topology of DHTs, the anonymity and cryptography of free route " -"mixnets, \n" -"and the adaptability of packet switched networking. The value comes not " -"from \n" -"novel concepts of algorithms though, but from careful engineering " -"combining \n" -"the research results of existing systems and papers. While there are a " -"few \n" -"similar efforts worth reviewing, both for technical and functional " -"comparisons, \n" +"I2P's architecture builds on the concepts of message oriented middleware, \n" +"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n" +"and the adaptability of packet switched networking. The value comes not from \n" +"novel concepts of algorithms though, but from careful engineering combining \n" +"the research results of existing systems and papers. While there are a few \n" +"similar efforts worth reviewing, both for technical and functional comparisons, \n" "two in particular are pulled out here - Tor and Freenet." msgstr "" @@ -10396,263 +9055,164 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:682 msgid "" "At first glance, Tor and I2P have many functional and anonymity related \n" -"similarities. While I2P's development began before we were aware of the " -"early \n" -"stage efforts on Tor, many of the lessons of the original onion routing " -"and \n" -"ZKS efforts were integrated into I2P's design. Rather than building an " -"essentially \n" -"trusted, centralized system with directory servers, I2P has a self " -"organizing \n" -"network database with each peer taking on the responsibility of profiling" -" \n" -"other routers to determine how best to exploit available resources. " -"Another \n" -"key difference is that while both I2P and Tor use layered and ordered " -"paths \n" -"(tunnels and circuits/streams), I2P is fundamentally a packet switched " -"network, \n" -"while Tor is fundamentally a circuit switched one, allowing I2P to " -"transparently \n" -"route around congestion or other network failures, operate redundant " -"pathways, \n" -"and load balance the data across available resources. While Tor offers " -"the \n" -"useful outproxy functionality by offering integrated outproxy discovery " -"and \n" -"selection, I2P leaves such application layer decisions up to applications" -" \n" -"running on top of I2P - in fact, I2P has even externalized the TCP-like " -"streaming \n" -"library itself to the application layer, allowing developers to " -"experiment \n" -"with different strategies, exploiting their domain specific knowledge to " -"offer \n" +"similarities. While I2P's development began before we were aware of the early \n" +"stage efforts on Tor, many of the lessons of the original onion routing and \n" +"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n" +"trusted, centralized system with directory servers, I2P has a self organizing \n" +"network database with each peer taking on the responsibility of profiling \n" +"other routers to determine how best to exploit available resources. Another \n" +"key difference is that while both I2P and Tor use layered and ordered paths \n" +"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n" +"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n" +"route around congestion or other network failures, operate redundant pathways, \n" +"and load balance the data across available resources. While Tor offers the \n" +"useful outproxy functionality by offering integrated outproxy discovery and \n" +"selection, I2P leaves such application layer decisions up to applications \n" +"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n" +"library itself to the application layer, allowing developers to experiment \n" +"with different strategies, exploiting their domain specific knowledge to offer \n" "better performance." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:703 msgid "" -"From an anonymity perspective, there is much similarity when the core " -"networks \n" -"are compared. However, there are a few key differences. When dealing with" -" \n" -"an internal adversary or most external adversaries, I2P's simplex tunnels" -" \n" -"expose half as much traffic data than would be exposed with Tor's duplex " -"circuits \n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels. \n" -"While I2P's peer selection and ordering strategies should sufficiently " -"address \n" -"predecessor attacks, should a switch to bidirectional tunnels be " -"necessary,\n" -"we could simply build an inbound and outbound tunnel along the same " -"routers." +"From an anonymity perspective, there is much similarity when the core networks \n" +"are compared. However, there are a few key differences. When dealing with \n" +"an internal adversary or most external adversaries, I2P's simplex tunnels \n" +"expose half as much traffic data than would be exposed with Tor's duplex circuits \n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels. \n" +"While I2P's peer selection and ordering strategies should sufficiently address \n" +"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n" +"we could simply build an inbound and outbound tunnel along the same routers." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:717 msgid "" -"Another anonymity issue comes up in Tor's use of telescopic tunnel " -"creation, \n" -"as simple packet counting and timing measurements as the cells in a " -"circuit \n" -"pass through an adversary's node exposes statistical information " -"regarding \n" -"where the adversary is within the circuit. I2P's unidirectional tunnel " -"creation \n" -"with a single message so that this data is not exposed. Protecting the " -"position \n" -"in a tunnel is important, as an adversary would otherwise be able to " -"mount \n" -"a series of powerful predecessor, intersection, and traffic confirmation " -"attacks." +"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n" +"as simple packet counting and timing measurements as the cells in a circuit \n" +"pass through an adversary's node exposes statistical information regarding \n" +"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n" +"with a single message so that this data is not exposed. Protecting the position \n" +"in a tunnel is important, as an adversary would otherwise be able to mount \n" +"a series of powerful predecessor, intersection, and traffic confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:727 msgid "" -"Tor's support for a second tier of \"onion proxies\" does offer a non-" -"trivial \n" -"degree of anonymity while requiring a low cost of entry, while I2P will " -"not \n" +"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n" +"degree of anonymity while requiring a low cost of entry, while I2P will not \n" "offer this topology until 2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:733 msgid "" -"On the whole, Tor and I2P complement each other in their focus - Tor " -"works \n" -"towards offering high speed anonymous Internet outproxying, while I2P " -"works \n" -"towards offering a decentralized resilient network in itself. In theory, " -"both \n" -"can be used to achieve both purposes, but given limited development " -"resources, \n" -"they both have their strengths and weaknesses. The I2P developers have " -"considered \n" -"the steps necessary to modify Tor to take advantage of I2P's design, but " -"concerns \n" -"of Tor's viability under resource scarcity suggest that I2P's packet " -"switching \n" +"On the whole, Tor and I2P complement each other in their focus - Tor works \n" +"towards offering high speed anonymous Internet outproxying, while I2P works \n" +"towards offering a decentralized resilient network in itself. In theory, both \n" +"can be used to achieve both purposes, but given limited development resources, \n" +"they both have their strengths and weaknesses. The I2P developers have considered \n" +"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n" +"of Tor's viability under resource scarcity suggest that I2P's packet switching \n" "architecture will be able to exploit scarce resources more effectively." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:747 msgid "" -"Freenet played a large part in the initial stages of I2P's design - " -"giving \n" -"proof to the viability of a vibrant pseudonymous community completely " -"contained \n" -"within the network, demonstrating that the dangers inherent in outproxies" -" \n" -"could be avoided. The first seed of I2P began as a replacement " -"communication \n" -"layer for Freenet, attempting to factor out the complexities of a " -"scalable, \n" -"anonymous and secure point to point communication from the complexities " -"of \n" -"a censorship resistant distributed data store. Over time however, some of" -" \n" -"the anonymity and scalability issues inherent in Freenet's algorithms " -"made \n" -"it clear that I2P's focus should stay strictly on providing a generic " -"anonymous \n" -"communication layer, rather than as a component of Freenet. Over the " -"years, \n" -"the Freenet developers have come to see the weaknesses in the older " -"design, \n" -"prompting them to suggest that they will require a \"premix\" layer to " -"offer \n" -"substantial anonymity. In other words, Freenet needs to run on top of a " -"mixnet \n" -"such as I2P or Tor, with \"client nodes\" requesting and publishing data " -"through \n" -"the mixnet to the \"server nodes\" which then fetch and store the data " -"according \n" +"Freenet played a large part in the initial stages of I2P's design - giving \n" +"proof to the viability of a vibrant pseudonymous community completely contained \n" +"within the network, demonstrating that the dangers inherent in outproxies \n" +"could be avoided. The first seed of I2P began as a replacement communication \n" +"layer for Freenet, attempting to factor out the complexities of a scalable, \n" +"anonymous and secure point to point communication from the complexities of \n" +"a censorship resistant distributed data store. Over time however, some of \n" +"the anonymity and scalability issues inherent in Freenet's algorithms made \n" +"it clear that I2P's focus should stay strictly on providing a generic anonymous \n" +"communication layer, rather than as a component of Freenet. Over the years, \n" +"the Freenet developers have come to see the weaknesses in the older design, \n" +"prompting them to suggest that they will require a \"premix\" layer to offer \n" +"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n" +"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n" +"the mixnet to the \"server nodes\" which then fetch and store the data according \n" "to Freenet's heuristic distributed data storage algorithms." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:766 msgid "" -"Freenet's functionality is very complementary to I2P's, as Freenet " -"natively \n" -"provides many of the tools for operating medium and high latency systems," -" \n" -"while I2P natively provides the low latency mix network suitable for " -"offering \n" -"adequate anonymity. The logic of separating the mixnet from the " -"censorship-\n" -"resistant distributed data store still seems self-evident from an " -"engineering, \n" -"anonymity, security, and resource allocation perspective, so hopefully " -"the \n" -"Freenet team will pursue efforts in that direction, if not simply reusing" -" \n" +"Freenet's functionality is very complementary to I2P's, as Freenet natively \n" +"provides many of the tools for operating medium and high latency systems, \n" +"while I2P natively provides the low latency mix network suitable for offering \n" +"adequate anonymity. The logic of separating the mixnet from the censorship-\n" +"resistant distributed data store still seems self-evident from an engineering, \n" +"anonymity, security, and resource allocation perspective, so hopefully the \n" +"Freenet team will pursue efforts in that direction, if not simply reusing \n" "(or helping to improve, as necessary) existing mixnets like I2P or Tor." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:777 msgid "" "It is worth mentioning that there has recently been discussion and work \n" -"by the Freenet developers on a \"globally scalable darknet\" using " -"restricted \n" -"routes between peers of various trust. While insufficient information has" -" \n" -"been made publicly available regarding how such a system would operate " -"for \n" -"a full review, from what has been said the anonymity and scalability " -"claims \n" -"seem highly dubious. In particular, the appropriateness for use in " -"hostile \n" -"regimes against state level adversaries has been tremendously overstated," -" \n" -"and any analysis on the implications of resource scarcity upon the " -"scalability \n" -"of the network has seemingly been avoided. Further questions regarding " -"susceptibility \n" -"to traffic analysis, trust and other topics do exist, but a more in-depth" -" \n" -"review of this \"globally scalable darknet\" will have to wait until the " -"Freenet \n" +"by the Freenet developers on a \"globally scalable darknet\" using restricted \n" +"routes between peers of various trust. While insufficient information has \n" +"been made publicly available regarding how such a system would operate for \n" +"a full review, from what has been said the anonymity and scalability claims \n" +"seem highly dubious. In particular, the appropriateness for use in hostile \n" +"regimes against state level adversaries has been tremendously overstated, \n" +"and any analysis on the implications of resource scarcity upon the scalability \n" +"of the network has seemingly been avoided. Further questions regarding susceptibility \n" +"to traffic analysis, trust and other topics do exist, but a more in-depth \n" +"review of this \"globally scalable darknet\" will have to wait until the Freenet \n" "team makes more information available." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:793 msgid "" -"I2P itself doesn't really do much - it simply sends messages to remote " -"destinations \n" -"and receives messages targeting local destinations - most of the " -"interesting \n" -"work goes on at the layers above it. By itself, I2P could be seen as an " -"anonymous \n" -"and secure IP layer, and the bundled streaming" -" library \n" -"as an implementation of an anonymous and secure TCP layer on top of it. " -"Beyond \n" -"that, I2PTunnel exposes a generic TCP " -"proxying \n" -"system for either getting into or out of the I2P network, plus a variety " -"of \n" +"I2P itself doesn't really do much - it simply sends messages to remote destinations \n" +"and receives messages targeting local destinations - most of the interesting \n" +"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n" +"and secure IP layer, and the bundled streaming library \n" +"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n" +"that, I2PTunnel exposes a generic TCP proxying \n" +"system for either getting into or out of the I2P network, plus a variety of \n" "network applications provide further functionality for end users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:804 msgid "Streaming library" -msgstr "" +msgstr "مكتبة البث" #: i2p2www/pages/site/docs/how/tech-intro.html:805 msgid "" -"The I2P streaming library can be viewed as a generic streaming interface " -"(mirroring TCP sockets),\n" -"and the implementation supports a sliding " -"window protocol\n" -"with several optimizations, to take into account the high delay over I2P." -"\n" +"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n" +"and the implementation supports a sliding window protocol\n" +"with several optimizations, to take into account the high delay over I2P.\n" "Individual streams may adjust the maximum packet size and \n" -"other options, though the default of 4KB compressed seems a reasonable " -"tradeoff \n" -"between the bandwidth costs of retransmitting lost messages and the " -"latency \n" +"other options, though the default of 4KB compressed seems a reasonable tradeoff \n" +"between the bandwidth costs of retransmitting lost messages and the latency \n" "of multiple messages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:815 msgid "" "In addition, in consideration of the relatively high cost of subsequent \n" -"messages, the streaming library's protocol for scheduling and delivering " -"messages \n" -"has been optimized to allow individual messages passed to contain as much" -" \n" -"information as is available. For instance, a small HTTP transaction " -"proxied \n" -"through the streaming library can be completed in a single round trip - " -"the \n" -"first message bundles a SYN, FIN and the small payload (an HTTP request " -"typically \n" -"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many" -" \n" -"HTTP responses fit). While an additional ACK must be transmitted to tell " -"the \n" -"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy " -"can \n" +"messages, the streaming library's protocol for scheduling and delivering messages \n" +"has been optimized to allow individual messages passed to contain as much \n" +"information as is available. For instance, a small HTTP transaction proxied \n" +"through the streaming library can be completed in a single round trip - the \n" +"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n" +"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n" +"HTTP responses fit). While an additional ACK must be transmitted to tell the \n" +"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n" "deliver the full response to the browser immediately." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:828 msgid "" -"On the whole, however, the streaming library bears much resemblance to an" -" \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms \n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK, \n" +"On the whole, however, the streaming library bears much resemblance to an \n" +"abstraction of TCP, with its sliding windows, congestion control algorithms \n" +"(both slow start and congestion avoidance), and general packet behavior (ACK, \n" "SYN, FIN, RST, etc)." msgstr "" @@ -10682,227 +9242,142 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:842 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning" -" \n" -"with advocates across the spectrum of possibilities. However, given I2P's" -" \n" -"inherent demand for secure communication and decentralized operation, the" -" \n" -"traditional DNS-style naming system is clearly out, as are \"majority " -"rules\" \n" -"voting systems. Instead, I2P ships with a generic naming library and a " -"base \n" -"implementation designed to work off a local name to destination mapping, " -"as \n" -"well as an optional add-on application called the \"Address Book\". The " -"address book \n" -"is a web-of-trust-driven secure, distributed, and human readable naming " -"system, \n" -"sacrificing only the call for all human readable names to be globally " -"unique \n" -"by mandating only local uniqueness. While all messages in I2P are " -"cryptographically \n" -"addressed by their destination, different people can have local address " -"book \n" -"entries for \"Alice\" which refer to different destinations. People can " -"still \n" -"discover new names by importing published address books of peers " -"specified \n" -"in their web of trust, by adding in the entries provided through a third " -"party, \n" -"or (if some people organize a series of published address books using a " -"first \n" -"come first serve registration system) people can choose to treat these " -"address books \n" +"Naming within I2P has been an oft-debated topic since the very beginning \n" +"with advocates across the spectrum of possibilities. However, given I2P's \n" +"inherent demand for secure communication and decentralized operation, the \n" +"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n" +"voting systems. Instead, I2P ships with a generic naming library and a base \n" +"implementation designed to work off a local name to destination mapping, as \n" +"well as an optional add-on application called the \"Address Book\". The address book \n" +"is a web-of-trust-driven secure, distributed, and human readable naming system, \n" +"sacrificing only the call for all human readable names to be globally unique \n" +"by mandating only local uniqueness. While all messages in I2P are cryptographically \n" +"addressed by their destination, different people can have local address book \n" +"entries for \"Alice\" which refer to different destinations. People can still \n" +"discover new names by importing published address books of peers specified \n" +"in their web of trust, by adding in the entries provided through a third party, \n" +"or (if some people organize a series of published address books using a first \n" +"come first serve registration system) people can choose to treat these address books \n" "as name servers, emulating traditional DNS." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:862 msgid "" "I2P does not promote the use of DNS-like services though, as the damage \n" -"done by hijacking a site can be tremendous - and insecure destinations " -"have \n" -"no value. DNSsec itself still falls back on registrars and certificate " -"authorities, \n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the \n" -"reply spoofed, as they are encrypted to the destination's public keys, " -"and \n" -"a destination itself is just a pair of public keys and a certificate. " -"DNS-style \n" -"systems on the other hand allow any of the name servers on the lookup " -"path \n" -"to mount simple denial of service and spoofing attacks. Adding on a " -"certificate \n" -"authenticating the responses as signed by some centralized certificate " -"authority \n" -"would address many of the hostile nameserver issues but would leave open " -"replay \n" +"done by hijacking a site can be tremendous - and insecure destinations have \n" +"no value. DNSsec itself still falls back on registrars and certificate authorities, \n" +"while with I2P, requests sent to a destination cannot be intercepted or the \n" +"reply spoofed, as they are encrypted to the destination's public keys, and \n" +"a destination itself is just a pair of public keys and a certificate. DNS-style \n" +"systems on the other hand allow any of the name servers on the lookup path \n" +"to mount simple denial of service and spoofing attacks. Adding on a certificate \n" +"authenticating the responses as signed by some centralized certificate authority \n" +"would address many of the hostile nameserver issues but would leave open replay \n" "attacks as well as hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:876 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness \n" -"of Sybil attacks in anonymous systems - the attacker can simply create an" -" \n" -"arbitrarily high number of peers and \"vote\" with each to take over a " -"given \n" -"name. Proof-of-work methods can be used to make identity non-free, but as" -" \n" -"the network grows the load required to contact everyone to conduct online" -" \n" -"voting is implausible, or if the full network is not queried, different " -"sets \n" +"Voting style naming is dangerous as well, especially given the effectiveness \n" +"of Sybil attacks in anonymous systems - the attacker can simply create an \n" +"arbitrarily high number of peers and \"vote\" with each to take over a given \n" +"name. Proof-of-work methods can be used to make identity non-free, but as \n" +"the network grows the load required to contact everyone to conduct online \n" +"voting is implausible, or if the full network is not queried, different sets \n" "of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:886 msgid "" -"As with the Internet however, I2P is keeping the design and operation of" -" \n" -"a naming system out of the (IP-like) communication layer. The bundled " -"naming \n" -"library includes a simple service provider interface which alternate " -"naming \n" -"systems can plug into, allowing end users to drive what sort of naming " -"tradeoffs \n" +"As with the Internet however, I2P is keeping the design and operation of \n" +"a naming system out of the (IP-like) communication layer. The bundled naming \n" +"library includes a simple service provider interface which alternate naming \n" +"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n" "they prefer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:895 msgid "" -"The old Syndie bundled with I2P has been replaced by the new Syndie which" -"\n" -"is distributed separately. For more information see the Syndie\n" +"The old Syndie bundled with I2P has been replaced by the new Syndie which\n" +"is distributed separately. For more information see the Syndie\n" "pages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:901 msgid "" -"Syndie is a safe, anonymous blogging / content publication / content " -"aggregation \n" -"system. It lets you create information, share it with others, and read " -"posts \n" -"from those you're interested in, all while taking into consideration your" -" \n" -"needs for security and anonymity. Rather than building its own content " -"distribution \n" -"network, Syndie is designed to run on top of existing networks, " -"syndicating \n" -"content through I2P Sites, Tor hidden services, Freenet freesites, normal" -" websites, \n" -"usenet newsgroups, email lists, RSS feeds, etc. Data published with " -"Syndie \n" -"is done so as to offer pseudonymous authentication to anyone reading or " -"archiving \n" +"Syndie is a safe, anonymous blogging / content publication / content aggregation \n" +"system. It lets you create information, share it with others, and read posts \n" +"from those you're interested in, all while taking into consideration your \n" +"needs for security and anonymity. Rather than building its own content distribution \n" +"network, Syndie is designed to run on top of existing networks, syndicating \n" +"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n" +"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n" +"is done so as to offer pseudonymous authentication to anyone reading or archiving \n" "it." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:916 msgid "" -"I2PTunnel is probably I2P's most popular and versatile client " -"application, \n" -"allowing generic proxying both into and out of the I2P network. I2PTunnel" -" \n" -"can be viewed as four separate proxying applications - a \"client\" which" -" receives \n" -"inbound TCP connections and forwards them to a given I2P destination, an " -"\"httpclient\" \n" -"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the " -"requests to \n" -"the appropriate I2P destination (after querying the naming service if " -"necessary), \n" -"a \"server\" which receives inbound I2P streaming connections on a " -"destination \n" -"and forwards them to a given TCP host+port, and an \"httpserver\" which " -"extends \n" -"the \"server\" by parsing the HTTP request and responses to allow safer " -"operation. \n" -"There is an additional \"socksclient\" application, but its use is not " -"encouraged \n" +"I2PTunnel is probably I2P's most popular and versatile client application, \n" +"allowing generic proxying both into and out of the I2P network. I2PTunnel \n" +"can be viewed as four separate proxying applications - a \"client\" which receives \n" +"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n" +"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n" +"the appropriate I2P destination (after querying the naming service if necessary), \n" +"a \"server\" which receives inbound I2P streaming connections on a destination \n" +"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n" +"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n" +"There is an additional \"socksclient\" application, but its use is not encouraged \n" "for reasons previously mentioned." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:930 msgid "" -"I2P itself is not an outproxy network - the anonymity and security " -"concerns \n" -"inherent in a mix net which forwards data into and out of the mix have " -"kept \n" -"I2P's design focused on providing an anonymous network which capable of " -"meeting \n" -"the user's needs without requiring external resources. However, the " -"I2PTunnel \n" -"\"httpclient\" application offers a hook for outproxying - if the " -"hostname requested \n" -"doesn't end in \".i2p\", it picks a random destination from a user-" -"provided \n" -"set of outproxies and forwards the request to them. These destinations " -"are \n" -"simply I2PTunnel \"server\" instances run by volunteers who have " -"explicitly \n" -"chosen to run outproxies - no one is an outproxy by default, and running " -"an \n" -"outproxy doesn't automatically tell other people to proxy through you. " -"While \n" -"outproxies do have inherent weaknesses, they offer a simple proof of " -"concept \n" -"for using I2P and provide some functionality under a threat model which " -"may \n" +"I2P itself is not an outproxy network - the anonymity and security concerns \n" +"inherent in a mix net which forwards data into and out of the mix have kept \n" +"I2P's design focused on providing an anonymous network which capable of meeting \n" +"the user's needs without requiring external resources. However, the I2PTunnel \n" +"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n" +"doesn't end in \".i2p\", it picks a random destination from a user-provided \n" +"set of outproxies and forwards the request to them. These destinations are \n" +"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n" +"chosen to run outproxies - no one is an outproxy by default, and running an \n" +"outproxy doesn't automatically tell other people to proxy through you. While \n" +"outproxies do have inherent weaknesses, they offer a simple proof of concept \n" +"for using I2P and provide some functionality under a threat model which may \n" "be sufficient for some users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:946 msgid "" -"I2PTunnel enables most of the applications in use. An \"httpserver\" " -"pointing \n" -"at a webserver lets anyone run their own anonymous website (or \"I2P " -"Site\") \n" -"- a webserver is bundled with I2P for this purpose, but any webserver can" -" \n" -"be used. Anyone may run a \"client\" pointing at one of the anonymously " -"hosted \n" -"IRC servers, each of which are running a \"server\" pointing at their " -"local \n" -"IRCd and communicating between IRCds over their own \"client\" tunnels. " -"End \n" -"users also have \"client\" tunnels pointing at I2Pmail's \n" -"POP3 and SMTP destinations (which in turn are simply \"server\" instances" -" pointing \n" -"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at " -"I2P's CVS \n" -"server, allowing anonymous development. At times people have even run " -"\"client\" \n" +"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n" +"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n" +"- a webserver is bundled with I2P for this purpose, but any webserver can \n" +"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n" +"IRC servers, each of which are running a \"server\" pointing at their local \n" +"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n" +"users also have \"client\" tunnels pointing at I2Pmail's \n" +"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n" +"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n" +"server, allowing anonymous development. At times people have even run \"client\" \n" "proxies to access the \"server\" instances pointing at an NNTP server." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:963 msgid "" -"i2p-bt is a port of the mainline python BitTorrent client to run both the" -" \n" -"tracker and peer communication over I2P. Tracker requests are forwarded " -"through \n" -"the eepproxy to I2P Sites specified in the torrent file while tracker " -"responses \n" -"refer to peers by their destination explicitly, allowing i2p-bt to open " -"up \n" -"a streaming lib connection to query them " -"for \n" +"i2p-bt is a port of the mainline python BitTorrent client to run both the \n" +"tracker and peer communication over I2P. Tracker requests are forwarded through \n" +"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n" +"refer to peers by their destination explicitly, allowing i2p-bt to open up \n" +"a streaming lib connection to query them for \n" "blocks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:972 msgid "" -"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making" -" \n" -"a few modifications as necessary to strip any anonymity-compromising " -"information \n" -"from the application and to take into consideration the fact that IPs " -"cannot \n" +"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n" +"a few modifications as necessary to strip any anonymity-compromising information \n" +"from the application and to take into consideration the fact that IPs cannot \n" "be used for identifying peers." msgstr "" @@ -10915,10 +9390,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:986 msgid "" -"Bundled with the I2P install, I2PSnark offers a simple anonymous " -"BitTorrent \n" -"client with multitorrent capabilities, exposing all of the functionality " -"through \n" +"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n" +"client with multitorrent capabilities, exposing all of the functionality through \n" "a plain HTML web interface." msgstr "" @@ -10926,9 +9399,7 @@ msgstr "" #, python-format msgid "" "Robert is a Bittorrent client written in Python.\n" -"It is hosted on http://%(bob)s/Robert.html " +"It is hosted on http://%(bob)s/Robert.html " msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1003 @@ -10940,12 +9411,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1011 msgid "" -"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to" -" \n" -"run entirely on top of I2P. While it has disabled some of Phex's " -"functionality, \n" -"such as integration with Gnutella webcaches, the basic file sharing and " -"chatting \n" +"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n" +"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n" +"such as integration with Gnutella webcaches, the basic file sharing and chatting \n" "system is fully functional." msgstr "" @@ -10958,62 +9426,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1029 #, python-format msgid "" -"I2Pmail is more a service than an application - postman offers both " -"internal \n" -"and external email with POP3 and SMTP service through I2PTunnel instances" -" \n" -"accessing a series of components developed with mastiejaner, allowing " -"people \n" -"to use their preferred mail clients to send and receive mail " -"pseudonymously. \n" -"However, as most mail clients expose substantial identifying information," -" \n" -"I2P bundles susi23's web based susimail client which has been built " -"specifically \n" -"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers " -"transparent \n" -"virus filtering as well as denial of service prevention with hashcash " -"augmented \n" -"quotas. In addition, each user has control of their batching strategy " -"prior \n" -"to delivery through the mail.i2p outproxies, which are separate from the " -"mail.i2p \n" -"SMTP and POP3 servers - both the outproxies and inproxies communicate " -"with \n" -"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising " -"those \n" -"non-anonymous locations does not give access to the mail accounts or " -"activity \n" -"patterns of the user. At the moment the developers work on a " -"decentralized \n" -"mailsystem, called \"v2mail\". More information can be found on the I2P " -"Site \n" +"I2Pmail is more a service than an application - postman offers both internal \n" +"and external email with POP3 and SMTP service through I2PTunnel instances \n" +"accessing a series of components developed with mastiejaner, allowing people \n" +"to use their preferred mail clients to send and receive mail pseudonymously. \n" +"However, as most mail clients expose substantial identifying information, \n" +"I2P bundles susi23's web based susimail client which has been built specifically \n" +"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n" +"virus filtering as well as denial of service prevention with hashcash augmented \n" +"quotas. In addition, each user has control of their batching strategy prior \n" +"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n" +"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n" +"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n" +"non-anonymous locations does not give access to the mail accounts or activity \n" +"patterns of the user. At the moment the developers work on a decentralized \n" +"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n" "%(postman)s." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1051 msgid "" -"I2P-Bote is a distributed e-mail application. It does not use the " -"traditional\n" -"e-mail concept of sending an e-mail to a server and retrieving it from a " -"server.\n" +"I2P-Bote is a distributed e-mail application. It does not use the traditional\n" +"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n" "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n" -"One user can push a mail into the DHT, while another can request the " -"e-mail from the DHT.\n" -"And all the mails sent within the I2P-Bote network are automatically " -"encrypted end-to-end.
\n" -"Furthermore, I2P-Bote offers a remailer function on top of I2P, for " -"increased high-latency anonymity." +"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n" +"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end.
\n" +"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1061 msgid "" -"I2P-Messenger is an end-to-end encrypted serverless communication " -"application.\n" -"For communication between two users, they need to give each other their " -"destination keys, to allow the other to connect.\n" -"It supports file transfer and has a search for other users, based on " -"Seedless." +"I2P-Messenger is an end-to-end encrypted serverless communication application.\n" +"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n" +"It supports file transfer and has a search for other users, based on Seedless." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:2 @@ -11163,18 +9608,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" -"to find out information you don't want them to know?\" - who you are, " -"where\n" -"you are located, who you communicate with, or even when you communicate." -" \n" -"\"Perfect\" anonymity is not a useful concept here - software will not " -"make \n" -"you indistinguishable from people that don't use computers or who are not" -" on\n" -"the Internet. Instead, we are working to provide sufficient anonymity to" -" meet the\n" -"real needs of whomever we can - from those simply browsing websites, to " -"those exchanging\n" +"to find out information you don't want them to know?\" - who you are, where\n" +"you are located, who you communicate with, or even when you communicate. \n" +"\"Perfect\" anonymity is not a useful concept here - software will not make \n" +"you indistinguishable from people that don't use computers or who are not on\n" +"the Internet. Instead, we are working to provide sufficient anonymity to meet the\n" +"real needs of whomever we can - from those simply browsing websites, to those exchanging\n" "data, to those fearful of discovery by powerful organizations or states." msgstr "" @@ -11182,17 +9621,14 @@ msgstr "" msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" -"answering that question by exploring how I2P operates under various " -"attacks\n" +"answering that question by exploring how I2P operates under various attacks\n" "so that you may decide whether it meets your needs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" -"We welcome further research and analysis on I2P's resistance to the " -"threats described below.\n" -"More review of existing literature (much of it focused on Tor) and " -"original\n" +"We welcome further research and analysis on I2P's resistance to the threats described below.\n" +"More review of existing literature (much of it focused on Tor) and original\n" "work focused on I2P is needed." msgstr "" @@ -11204,69 +9640,52 @@ msgstr "" #, python-format msgid "" "I2P builds off the ideas of many other \n" -"systems, but a few key points should be kept in" -" mind when \n" +"systems, but a few key points should be kept in mind when \n" "reviewing related literature:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:102 msgid "" -"I2P is a free route mixnet - the message creator explicitly " -"defines the\n" -"path that messages will be sent out (the outbound tunnel), and the " -"message \n" -"recipient explicitly defines the path that messages will be received on " -"(the\n" +"I2P is a free route mixnet - the message creator explicitly defines the\n" +"path that messages will be sent out (the outbound tunnel), and the message \n" +"recipient explicitly defines the path that messages will be received on (the\n" "inbound tunnel)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:108 msgid "" -"I2P has no official entry and exit points - all peers fully " -"participate in the \n" +"I2P has no official entry and exit points - all peers fully participate in the \n" "mix, and there are no network layer in- or out-proxies (however, at the \n" "application layer, a few proxies do exist)" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:113 msgid "" -"I2P is fully distributed - there are no central controls or " -"authorities.\n" -"One could modify some routers to operate mix cascades (building tunnels " -"and giving\n" -"out the keys necessary to control the forwarding at the tunnel endpoint) " -"or directory \n" -"based profiling and selection, all without breaking compatibility with " -"the rest of \n" -"the network, but doing so is of course not necessary (and may even harm " -"one's\n" +"I2P is fully distributed - there are no central controls or authorities.\n" +"One could modify some routers to operate mix cascades (building tunnels and giving\n" +"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n" +"based profiling and selection, all without breaking compatibility with the rest of \n" +"the network, but doing so is of course not necessary (and may even harm one's\n" "anonymity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:123 #, python-format msgid "" -"We have documented plans to implement nontrivial delays\n" +"We have documented plans to implement nontrivial delays\n" "and batching strategies \n" -"whose existence is only known to the particular hop or tunnel gateway " -"that \n" -"receives the message, allowing a mostly low latency mixnet to provide " -"cover \n" +"whose existence is only known to the particular hop or tunnel gateway that \n" +"receives the message, allowing a mostly low latency mixnet to provide cover \n" "traffic for higher latency communication (e.g. email).\n" -"However we are aware that significant delays are required to provide " -"meaningful\n" -"protection, and that implementation of such delays will be a significant " -"challenge.\n" -"It is not clear at this time whether we will actually implement these " -"delay features." +"However we are aware that significant delays are required to provide meaningful\n" +"protection, and that implementation of such delays will be a significant challenge.\n" +"It is not clear at this time whether we will actually implement these delay features." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:134 msgid "" "In theory, routers along the message path may inject an \n" -"arbitrary number of hops before forwarding the message to the next peer, " -"though\n" +"arbitrary number of hops before forwarding the message to the next peer, though\n" "the current implementation does not." msgstr "" @@ -11280,8 +9699,7 @@ msgid "" "[Onion Routing],\n" "[Freenet], and\n" "[Tor].\n" -"Our design benefits substantially from the research published around that" -" time.\n" +"Our design benefits substantially from the research published around that time.\n" "I2P uses several onion routing techniques, so we continue to benefit\n" "from the significant academic interest in Tor." msgstr "" @@ -11289,12 +9707,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:152 msgid "" "Taking from the attacks and analysis put forth in the \n" -"anonymity " -"literature (largely \n" -"Traffic Analysis: " -"Protocols, Attacks, Design \n" -"Issues and Open Problems), the following briefly describes a wide " -"variety \n" +"anonymity literature (largely \n" +"Traffic Analysis: Protocols, Attacks, Design \n" +"Issues and Open Problems), the following briefly describes a wide variety \n" "of attacks as well as many of I2Ps defenses. We update\n" "this list to include new attacks as they are identified." msgstr "" @@ -11322,66 +9737,46 @@ msgstr "" msgid "" "The\n" "network comparisons and\n" -"\"garlic\" terminology pages may also " -"be helpful\n" +"\"garlic\" terminology pages may also be helpful\n" "to review." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:210 msgid "" -"A brute force attack can be mounted by a global passive or active " -"adversary, \n" -"watching all the messages pass between all of the nodes and attempting to" -" correlate\n" -"which message follows which path. Mounting this attack against I2P " -"should be \n" -"nontrivial, as all peers in the network are frequently sending messages " -"(both\n" -"end to end and network maintenance messages), plus an end to end message " -"changes\n" -"size and data along its path. In addition, the external adversary does " -"not have\n" -"access to the messages either, as inter-router communication is both " -"encrypted\n" -"and streamed (making two 1024 byte messages indistinguishable from one " -"2048 byte\n" +"A brute force attack can be mounted by a global passive or active adversary, \n" +"watching all the messages pass between all of the nodes and attempting to correlate\n" +"which message follows which path. Mounting this attack against I2P should be \n" +"nontrivial, as all peers in the network are frequently sending messages (both\n" +"end to end and network maintenance messages), plus an end to end message changes\n" +"size and data along its path. In addition, the external adversary does not have\n" +"access to the messages either, as inter-router communication is both encrypted\n" +"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n" "message)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:222 msgid "" -"However, a powerful attacker can use brute force to detect trends - if " -"they \n" -"can send 5GB to an I2P destination and monitor everyone's network " -"connection,\n" -"they can eliminate all peers who did not receive 5GB of data. Techniques" -" to \n" +"However, a powerful attacker can use brute force to detect trends - if they \n" +"can send 5GB to an I2P destination and monitor everyone's network connection,\n" +"they can eliminate all peers who did not receive 5GB of data. Techniques to \n" "defeat this attack exist, but may be prohibitively expensive (see: \n" -"Tarzan's " -"mimics\n" -"or constant rate traffic). Most users are not concerned with this " -"attack, as \n" -"the cost of mounting it are extreme (and often require illegal activity)." -" \n" +"Tarzan's mimics\n" +"or constant rate traffic). Most users are not concerned with this attack, as \n" +"the cost of mounting it are extreme (and often require illegal activity). \n" "However, the attack is still possible, for example by an observer at\n" "a large ISP or an Internet exchange point.\n" "Those who want to defend against it \n" "would want to take appropriate countermeasures, such as\n" -"setting low bandwidth limits, and using unpublished or encrypted " -"leasesets for I2P Sites.\n" -"Other countermeasures, such as nontrivial delays and restricted routes, " -"are\n" +"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n" +"Other countermeasures, such as nontrivial delays and restricted routes, are\n" "not currently implemented." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:239 #, python-format msgid "" -"As a partial defense against a single router or group of routers trying " -"to route all the network's traffic,\n" -"routers contain limits as to how many tunnels can be routed through a " -"single peer.\n" +"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n" +"routers contain limits as to how many tunnels can be routed through a single peer.\n" "As the network grows, these limits are subject to further adjustment.\n" "Other mechanisms for peer rating, selection and avoidance\n" "are discussed on the\n" @@ -11390,51 +9785,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:254 msgid "" -"I2P's messages are unidirectional and do not necessarily imply that a " -"reply\n" +"I2P's messages are unidirectional and do not necessarily imply that a reply\n" "will be sent. However, applications on top of I2P will most likely have\n" -"recognizable patterns within the frequency of their messages - for " -"instance, an \n" -"HTTP request will be a small message with a large sequence of reply " -"messages \n" -"containing the HTTP response. Using this data as well as a broad view of" -" the \n" -"network topology, an attacker may be able to disqualify some links as " -"being too \n" +"recognizable patterns within the frequency of their messages - for instance, an \n" +"HTTP request will be a small message with a large sequence of reply messages \n" +"containing the HTTP response. Using this data as well as a broad view of the \n" +"network topology, an attacker may be able to disqualify some links as being too \n" "slow to have passed the message along." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:264 msgid "" -"This sort of attack is powerful, but its applicability to I2P is non " -"obvious,\n" -"as the variation on message delays due to queuing, message processing, " -"and \n" -"throttling will often meet or exceed the time of passing a message along " -"a \n" -"single link - even when the attacker knows that a reply will be sent as " -"soon as\n" -"the message is received. There are some scenarios which will expose " -"fairly \n" -"automatic replies though - the streaming library does (with the SYN+ACK) " -"as does the \n" -"message mode of guaranteed delivery (with the " -"DataMessage+DeliveryStatusMessage)." +"This sort of attack is powerful, but its applicability to I2P is non obvious,\n" +"as the variation on message delays due to queuing, message processing, and \n" +"throttling will often meet or exceed the time of passing a message along a \n" +"single link - even when the attacker knows that a reply will be sent as soon as\n" +"the message is received. There are some scenarios which will expose fairly \n" +"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n" +"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:274 #, python-format msgid "" -"Without protocol scrubbing or higher latency, global active adversaries " -"can \n" -"gain substantial information. As such, people concerned with these " -"attacks could\n" -"increase the latency (using nontrivial " -"delays or \n" -"batching strategies), include protocol " -"scrubbing, or\n" -"other advanced tunnel routing techniques,\n" +"Without protocol scrubbing or higher latency, global active adversaries can \n" +"gain substantial information. As such, people concerned with these attacks could\n" +"increase the latency (using nontrivial delays or \n" +"batching strategies), include protocol scrubbing, or\n" +"other advanced tunnel routing techniques,\n" "but these are unimplemented in I2P." msgstr "" @@ -11447,25 +9825,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:291 msgid "" -"Intersection attacks against low latency systems are extremely powerful -" -"\n" -"periodically make contact with the target and keep track of what peers " -"are on\n" +"Intersection attacks against low latency systems are extremely powerful -\n" +"periodically make contact with the target and keep track of what peers are on\n" "the network. Over time, as node churn occurs the attacker will gain \n" -"significant information about the target by simply intersecting the sets " -"of\n" -"peers that are online when a message successfully goes through. The cost" -" of \n" -"this attack is significant as the network grows, but may be feasible in " -"some\n" +"significant information about the target by simply intersecting the sets of\n" +"peers that are online when a message successfully goes through. The cost of \n" +"this attack is significant as the network grows, but may be feasible in some\n" "scenarios." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:301 #, python-format msgid "" -"In summary, if an attacker is at both ends of your tunnel at the same " -"time,\n" +"In summary, if an attacker is at both ends of your tunnel at the same time,\n" "he may be successful.\n" "I2P does not have a full defense to this for low latency communication.\n" "This is an inherent weakness of low-latency onion routing.\n" @@ -11484,8 +9856,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:316 #, python-format msgid "" -"peer profiling and selection from a " -"small group that changes slowly" +"peer profiling and selection from a small " +"group that changes slowly" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:319 @@ -11508,8 +9880,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:332 msgid "" "Even in total, these defenses are not a complete solution.\n" -"Also, we have made some design choices that may significantly increase " -"our vulnerability:" +"Also, we have made some design choices that may significantly increase our vulnerability:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:337 @@ -11518,8 +9889,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" -"We use tunnel pools comprised of several tunnels, and traffic can shift " -"from tunnel to tunnel." +"We use tunnel pools comprised of several tunnels, and traffic can shift from" +" tunnel to tunnel." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:343 @@ -11529,8 +9900,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:346 msgid "" "Tunnel lengths are configurable.\n" -"While 3-hop tunnels are recommended for full protection, several " -"applications and\n" +"While 3-hop tunnels are recommended for full protection, several applications and\n" "services use 2-hop tunnels by default." msgstr "" @@ -11538,14 +9908,10 @@ msgstr "" #, python-format msgid "" "In the future, it could\n" -"for peers who can afford significant delays (per nontrivial\n" -"delays and batching strategies). " -"In addition,\n" -"this is only relevant for destinations that other people know about - a " -"private\n" -"group whose destination is only known to trusted peers does not have to " -"worry,\n" +"for peers who can afford significant delays (per nontrivial\n" +"delays and batching strategies). In addition,\n" +"this is only relevant for destinations that other people know about - a private\n" +"group whose destination is only known to trusted peers does not have to worry,\n" "as an adversary can't \"ping\" them to mount the attack.

" msgstr "" @@ -11556,8 +9922,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" -"There are a whole slew of denial of service attacks available against " -"I2P,\n" +"There are a whole slew of denial of service attacks available against I2P,\n" "each with different costs and consequences:" msgstr "" @@ -11580,10 +9945,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:387 msgid "" "Provide easy configuration options so that users may increase their\n" -"contribution (share percentage) to the network. Display easy-to-" -"understand\n" -"metrics such as \"share ratio\" so that users may see what they are " -"contributing." +"contribution (share percentage) to the network. Display easy-to-understand\n" +"metrics such as \"share ratio\" so that users may see what they are contributing." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:392 @@ -11595,29 +9958,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:399 #, python-format msgid "" -"Starvation attack: A hostile user may attempt to harm the network " -"by\n" -"creating a significant number of peers in the network who are not " -"identified as\n" -"being under control of the same entity (as with Sybil). These nodes then" -" \n" -"decide not to provide any resources to the network, causing existing " -"peers \n" -"to search through a larger network database or request more tunnels than" -" \n" +"Starvation attack: A hostile user may attempt to harm the network by\n" +"creating a significant number of peers in the network who are not identified as\n" +"being under control of the same entity (as with Sybil). These nodes then \n" +"decide not to provide any resources to the network, causing existing peers \n" +"to search through a larger network database or request more tunnels than \n" "should be necessary. \n" -"Alternatively, the nodes may provide intermittent service by periodically" -"\n" +"Alternatively, the nodes may provide intermittent service by periodically\n" "dropping selected traffic, or refusing connections to certain peers.\n" -"This behavior may be indistinguishable from that of a heavily-loaded or " -"failing node.\n" -"I2P addresses these issues by maintaining profiles on the \n" +"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n" +"I2P addresses these issues by maintaining profiles on the \n" "peers, attempting to identify underperforming ones and simply ignoring \n" "them, or using them rarely.\n" "We have significantly enhanced the\n" -"ability to recognize and avoid troublesome peers; however there are still" -"\n" +"ability to recognize and avoid troublesome peers; however there are still\n" "significant efforts required in this area." msgstr "" @@ -11625,30 +9979,18 @@ msgstr "" #, python-format msgid "" "Flooding attack: A hostile user may attempt to flood the network,\n" -"a peer, a destination, or a tunnel. Network and peer flooding is " -"possible,\n" -"and I2P does nothing to prevent standard IP layer flooding. The flooding" -" of\n" -"a destination with messages by sending a large number to the target's " -"various\n" -"inbound tunnel gateways is possible, but the destination will know this " -"both\n" -"by the contents of the message and because the tunnel's tests will fail." -" The\n" -"same goes for flooding just a single tunnel. I2P has no defenses for a " -"network\n" -"flooding attack. For a destination and tunnel flooding attack, the " -"target\n" -"identifies which tunnels are unresponsive and builds new ones. New code " -"could\n" -"also be written to add even more tunnels if the client wishes to handle " -"the\n" -"larger load. If, on the other hand, the load is more than the client can" -"\n" -"deal with, they can instruct the tunnels to throttle the number of " -"messages or\n" -"bytes they should pass on (once the advanced tunnel\n" +"a peer, a destination, or a tunnel. Network and peer flooding is possible,\n" +"and I2P does nothing to prevent standard IP layer flooding. The flooding of\n" +"a destination with messages by sending a large number to the target's various\n" +"inbound tunnel gateways is possible, but the destination will know this both\n" +"by the contents of the message and because the tunnel's tests will fail. The\n" +"same goes for flooding just a single tunnel. I2P has no defenses for a network\n" +"flooding attack. For a destination and tunnel flooding attack, the target\n" +"identifies which tunnels are unresponsive and builds new ones. New code could\n" +"also be written to add even more tunnels if the client wishes to handle the\n" +"larger load. If, on the other hand, the load is more than the client can\n" +"deal with, they can instruct the tunnels to throttle the number of messages or\n" +"bytes they should pass on (once the advanced tunnel\n" "operation is implemented)." msgstr "" @@ -11656,13 +9998,10 @@ msgstr "" msgid "" "CPU load attack: There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" -"operation, and a hostile attacker could use these to flood that peer with" -"\n" -"a large number of them in an attempt to overload the CPU. Both using " -"good \n" +"operation, and a hostile attacker could use these to flood that peer with\n" +"a large number of them in an attempt to overload the CPU. Both using good \n" "engineering practices and potentially requiring nontrivial certificates \n" -"(e.g. HashCash) to be attached to these expensive requests should " -"mitigate\n" +"(e.g. HashCash) to be attached to these expensive requests should mitigate\n" "the issue, though there may be room for an attacker to exploit various\n" "bugs in the implementation." msgstr "" @@ -11670,8 +10009,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:451 #, python-format msgid "" -"Floodfill DOS attack: A hostile user may attempt to harm the " -"network by\n" +"Floodfill DOS attack: A hostile user may attempt to harm the network by\n" "becoming a floodfill router. The current defenses against unreliable,\n" "intermittent, or malicious floodfill routers are poor.\n" "A floodfill router may provide bad or no response to lookups, and\n" @@ -11686,134 +10024,86 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:470 #, python-format msgid "" -"Tagging attacks - modifying a message so that it can later be identified" -" \n" -"further along the path - are by themselves impossible in I2P, as messages" -" \n" -"passed through tunnels are signed. However, if an attacker is the " -"inbound \n" -"tunnel gateway as well as a participant further along in that tunnel, " -"with\n" -"collusion they can identify the fact that they are in the same tunnel " -"(and \n" -"prior to adding unique hop ids and " -"other updates,\n" -"colluding peers within the same tunnel can recognize that fact without " -"any \n" -"effort). An attacker in an outbound tunnel and any part of an inbound " -"tunnel cannot \n" -"collude however, as the tunnel encryption pads and modifies the data " -"separately\n" -"for the inbound and outbound tunnels. External attackers cannot do " -"anything,\n" +"Tagging attacks - modifying a message so that it can later be identified \n" +"further along the path - are by themselves impossible in I2P, as messages \n" +"passed through tunnels are signed. However, if an attacker is the inbound \n" +"tunnel gateway as well as a participant further along in that tunnel, with\n" +"collusion they can identify the fact that they are in the same tunnel (and \n" +"prior to adding unique hop ids and other updates,\n" +"colluding peers within the same tunnel can recognize that fact without any \n" +"effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n" +"collude however, as the tunnel encryption pads and modifies the data separately\n" +"for the inbound and outbound tunnels. External attackers cannot do anything,\n" "as the links are encrypted and messages signed." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:488 msgid "" -"Partitioning attacks - finding ways to segregate (technically or " -"analytically)\n" -"the peers in a network - are important to keep in mind when dealing with " -"a \n" -"powerful adversary, since the size of the network plays a key role in " -"determining\n" -"your anonymity. Technical partitioning by cutting links between peers to" -" create\n" -"fragmented networks is addressed by I2P's built in network database, " -"which \n" -"maintains statistics about various peers so as to allow any existing " -"connections\n" -"to other fragmented sections to be exploited so as to heal the network. " -"However,\n" -"if the attacker does disconnect all links to uncontrolled peers, " -"essentially\n" -"isolating the target, no amount of network database healing will fix it." -" At\n" -"that point, the only thing the router can hope to do is notice that a " -"significant\n" -"number of previously reliable peers have become unavailable and alert the" -" client\n" -"that it is temporarily disconnected (this detection code is not " -"implemented at\n" +"Partitioning attacks - finding ways to segregate (technically or analytically)\n" +"the peers in a network - are important to keep in mind when dealing with a \n" +"powerful adversary, since the size of the network plays a key role in determining\n" +"your anonymity. Technical partitioning by cutting links between peers to create\n" +"fragmented networks is addressed by I2P's built in network database, which \n" +"maintains statistics about various peers so as to allow any existing connections\n" +"to other fragmented sections to be exploited so as to heal the network. However,\n" +"if the attacker does disconnect all links to uncontrolled peers, essentially\n" +"isolating the target, no amount of network database healing will fix it. At\n" +"that point, the only thing the router can hope to do is notice that a significant\n" +"number of previously reliable peers have become unavailable and alert the client\n" +"that it is temporarily disconnected (this detection code is not implemented at\n" "the moment)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:504 #, python-format msgid "" -"Partitioning the network analytically by looking for differences in how " -"routers \n" -"and destinations behave and grouping them accordingly is also a very " -"powerful\n" -"attack. For instance, an attacker harvesting" -" the network\n" -"database will know when a particular destination has 5 inbound tunnels in" -" their\n" -"LeaseSet while others have only 2 or 3, allowing the adversary to " -"potentially \n" -"partition clients by the number of tunnels selected. Another partition " -"is \n" -"possible when dealing with the nontrivial " -"delays and \n" -"batching strategies, as the tunnel " -"gateways and the\n" -"particular hops with non-zero delays will likely stand out. However, " -"this data\n" -"is only exposed to those specific hops, so to partition effectively on " -"that \n" -"matter, the attacker would need to control a significant portion of the " -"network\n" -"(and still that would only be a probabilistic partition, as they wouldn't" -" know\n" +"Partitioning the network analytically by looking for differences in how routers \n" +"and destinations behave and grouping them accordingly is also a very powerful\n" +"attack. For instance, an attacker harvesting the network\n" +"database will know when a particular destination has 5 inbound tunnels in their\n" +"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n" +"partition clients by the number of tunnels selected. Another partition is \n" +"possible when dealing with the nontrivial delays and \n" +"batching strategies, as the tunnel gateways and the\n" +"particular hops with non-zero delays will likely stand out. However, this data\n" +"is only exposed to those specific hops, so to partition effectively on that \n" +"matter, the attacker would need to control a significant portion of the network\n" +"(and still that would only be a probabilistic partition, as they wouldn't know\n" "which other tunnels or messages have those delays)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:520 #, python-format msgid "" -"Also discussed on the network database " -"page (bootstrap attack)." +"Also discussed on the network database page" +" (bootstrap attack)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:528 msgid "" -"The predecessor attack is passively gathering statistics in an attempt to" -" see\n" -"what peers are 'close' to the destination by participating in their " -"tunnels and\n" -"keeping track of the previous or next hop (for outbound or inbound " -"tunnels, \n" -"respectively). Over time, using a perfectly random sample of peers and " -"random\n" -"ordering, an attacker would be able to see which peer shows up as " -"'closer' \n" -"statistically more than the rest, and that peer would in turn be where " -"the\n" +"The predecessor attack is passively gathering statistics in an attempt to see\n" +"what peers are 'close' to the destination by participating in their tunnels and\n" +"keeping track of the previous or next hop (for outbound or inbound tunnels, \n" +"respectively). Over time, using a perfectly random sample of peers and random\n" +"ordering, an attacker would be able to see which peer shows up as 'closer' \n" +"statistically more than the rest, and that peer would in turn be where the\n" "target is located." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:538 #, python-format msgid "" -"I2P avoids this in four ways: first, the peers selected to participate in" -"\n" -"tunnels are not randomly sampled throughout the network - they are " -"derived from\n" -"the peer selection algorithm which " -"breaks them\n" -"into tiers. Second, with strict " -"ordering of peers\n" -"in a tunnel, the fact that a peer shows up more frequently does not mean " -"they're\n" -"the source. Third, with permuted " -"tunnel length\n" +"I2P avoids this in four ways: first, the peers selected to participate in\n" +"tunnels are not randomly sampled throughout the network - they are derived from\n" +"the peer selection algorithm which breaks them\n" +"into tiers. Second, with strict ordering of peers\n" +"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n" +"the source. Third, with permuted tunnel length\n" "(not enabled by default)\n" "even 0 hop tunnels can provide plausible deniability as the occasional \n" "variation of the gateway will look like normal tunnels. Fourth, with \n" -"restricted routes " -"(unimplemented), only the peer with\n" -"a restricted connection to the target will ever contact the target, while" -" \n" +"restricted routes (unimplemented), only the peer with\n" +"a restricted connection to the target will ever contact the target, while \n" "attackers will merely run into that gateway." msgstr "" @@ -11851,8 +10141,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" -"Network growth will make it more difficult to obtain a given proportion " -"of the network" +"Network growth will make it more difficult to obtain a given proportion of " +"the network" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:590 @@ -11861,10 +10151,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:593 msgid "" -"\"Hidden mode\", which prevents a router from publishing its information " -"to the netDb,\n" -"(but also prevents it from relaying data) is not widely used now but " -"could be." +"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n" +"(but also prevents it from relaying data) is not widely used now but could be." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:599 @@ -11872,19 +10160,15 @@ msgstr "" msgid "" "In future implementations,\n" "basic and \n" -"comprehensive restricted " -"routes,\n" -"this attack loses much of its power, as the \"hidden\" peers do not " -"publish their\n" -"contact addresses in the network database - only the tunnels through " -"which \n" +"comprehensive restricted routes,\n" +"this attack loses much of its power, as the \"hidden\" peers do not publish their\n" +"contact addresses in the network database - only the tunnels through which \n" "they can be reached (as well as their public keys, etc)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:608 msgid "" -"In the future, routers could use GeoIP to identify if they are in a " -"particular\n" +"In the future, routers could use GeoIP to identify if they are in a particular\n" "country where identification as an I2P node would be risky.\n" "In that case, the router could automatically enable hidden mode, or\n" "enact other restricted route methods." @@ -11895,10 +10179,8 @@ msgstr "" msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" "or state-level firewall could identify that a computer is running I2P.\n" -"As discussed above, I2P is not specifically " -"designed\n" -"to hide that a computer is running I2P. However, several design decisions" -" made\n" +"As discussed above, I2P is not specifically designed\n" +"to hide that a computer is running I2P. However, several design decisions made\n" "in the design of the\n" "transport layer and protocols\n" "make it somewhat difficult to identify I2P traffic:" @@ -11914,8 +10196,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:636 msgid "" -"DH key exchange with no protocol bytes or other unencrypted constant " -"fields" +"DH key exchange with no protocol bytes or other unencrypted constant fields" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:639 @@ -11924,14 +10205,13 @@ msgid "" "Simultaneous use of both\n" "TCP and\n" "UDP transports.\n" -"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to" -" track." +"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:647 msgid "" -"In the near future, we plan to directly address traffic analysis issues " -"by further obfuscation of I2P transport protocols, possibly including:" +"In the near future, we plan to directly address traffic analysis issues by " +"further obfuscation of I2P transport protocols, possibly including:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:651 @@ -11948,20 +10228,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" -"Development of additional transport methods that mimic SSL or other " -"common protocols" +"Development of additional transport methods that mimic SSL or other common " +"protocols" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "" -"Review of padding strategies at higher layers to see how they affect " -"packet sizes at the transport layer" +"Review of padding strategies at higher layers to see how they affect packet " +"sizes at the transport layer" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:663 msgid "" -"Review of methods implemented by various state-level firewalls to block " -"Tor" +"Review of methods implemented by various state-level firewalls to block Tor" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:666 @@ -11977,36 +10256,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:680 msgid "" -"Sybil describes a category of attacks where the adversary creates " -"arbitrarily\n" +"Sybil describes a category of attacks where the adversary creates arbitrarily\n" "large numbers of colluding nodes and uses the increased numbers to help \n" -"mounting other attacks. For instance, if an attacker is in a network " -"where peers\n" -"are selected randomly and they want an 80% chance to be one of those " -"peers, they\n" -"simply create five times the number of nodes that are in the network and " -"roll \n" -"the dice. When identity is free, Sybil can be a very potent technique " -"for a \n" -"powerful adversary. The primary technique to address this is simply to " -"make \n" -"identity 'non free' - Tarzan\n" +"mounting other attacks. For instance, if an attacker is in a network where peers\n" +"are selected randomly and they want an 80% chance to be one of those peers, they\n" +"simply create five times the number of nodes that are in the network and roll \n" +"the dice. When identity is free, Sybil can be a very potent technique for a \n" +"powerful adversary. The primary technique to address this is simply to make \n" +"identity 'non free' - Tarzan\n" "(among others) uses the fact that IP addresses are limited, while \n" "IIP used \n" -"HashCash to 'charge' for " -"creating a new\n" -"identity. We currently have not implemented any particular technique to " -"address\n" +"HashCash to 'charge' for creating a new\n" +"identity. We currently have not implemented any particular technique to address\n" "Sybil, but do include placeholder certificates in the router's and \n" -"destination's data structures which can contain a HashCash certificate of" -" \n" -"appropriate value when necessary (or some other certificate proving " -"scarcity)." +"destination's data structures which can contain a HashCash certificate of \n" +"appropriate value when necessary (or some other certificate proving scarcity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:698 -msgid "Requiring HashCash Certificates in various places has two major problems:" +msgid "" +"Requiring HashCash Certificates in various places has two major problems:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:702 @@ -12016,17 +10285,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:705 msgid "" "The classic HashCash problem -\n" -"selecting HashCash values that are meaningful proofs of work on high-end " -"machines,\n" +"selecting HashCash values that are meaningful proofs of work on high-end machines,\n" "while still being feasible on low-end machines such as mobile devices." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:712 msgid "" -"Various limitations on the number of routers in a given IP range restrict" -"\n" -"the vulnerability to attackers that don't have the ability to put " -"machines\n" +"Various limitations on the number of routers in a given IP range restrict\n" +"the vulnerability to attackers that don't have the ability to put machines\n" "in several IP blocks.\n" "However, this is not a meaningful defense against a powerful adversary." msgstr "" @@ -12048,22 +10314,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:733 #, python-format msgid "" -"By refusing to accept or forward tunnel build requests, except to a " -"colluding peer, a router could ensure\n" +"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n" "that a tunnel is formed wholly from its set of colluding routers.\n" -"The chances of success are enhanced if there is a large number of " -"colluding routers,\n" +"The chances of success are enhanced if there is a large number of colluding routers,\n" "i.e. a Sybil attack.\n" "This is somewhat mitigated by our\n" -"peer profiling methods used to monitor " -"the performance\n" +"peer profiling methods used to monitor the performance\n" "of peers.\n" "However, this is a powerful attack as the number of routers approaches\n" "f = 0.2, or 20% malicious nodes, as specifed in the paper.\n" -"The malicous routers could also maintain connections to the target router" -" and provide\n" -"excellent forwarding bandwidth for traffic over those connections, in an " -"attempt\n" +"The malicous routers could also maintain connections to the target router and provide\n" +"excellent forwarding bandwidth for traffic over those connections, in an attempt\n" "to manipulate the profiles managed by the target and appear attractive.\n" "Further research and defenses may be necessary." msgstr "" @@ -12072,38 +10333,29 @@ msgstr "" #, python-format msgid "" "We use strong cryptography with long keys, and\n" -"we assume the security of the industry-standard cryptographic primitives " -"used in I2P, as documented\n" +"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n" "on the low-level cryptography page. \n" "Security features include the immediate detection of \n" -"altered messages along the path, the inability to decrypt messages not " -"addressed to you,\n" +"altered messages along the path, the inability to decrypt messages not addressed to you,\n" "and defense against man-in-the-middle attacks.\n" -"The key sizes chosen in 2003 were quite conservative at the time, and are" -" still longer than\n" -"those used in other anonymity " -"networks.\n" +"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n" +"those used in other anonymity networks.\n" "We don't think the current key lengths are our biggest weakness,\n" "especially for traditional, non-state-level adversaries;\n" "bugs and the small size of the network are much more worrisome.\n" -"Of course, all cryptographic algorithms eventually become obsolete due to" -"\n" -"the advent of faster processors, cryptographic research, and advancements" -" in\n" +"Of course, all cryptographic algorithms eventually become obsolete due to\n" +"the advent of faster processors, cryptographic research, and advancements in\n" "methods such as rainbow tables, clusters of video game hardware, etc.\n" -"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys" -" or change\n" +"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n" "shared secret values while maintaining backward compatibility." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:773 #, python-format msgid "" -"Upgrading the various data structures and protocols to support longer " -"keys\n" +"Upgrading the various data structures and protocols to support longer keys\n" "will have to be tackled eventually, and this will be a\n" -"major undertaking, just as it will be " -"for \n" +"major undertaking, just as it will be for \n" "others.\n" "Hopefully, through careful planning, we can minimize the disruption, and\n" "implement mechanisms to make it easier for future transitions." @@ -12112,12 +10364,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:782 msgid "" "In the future, several I2P protocols and data structures\n" -"support securely padding messages to arbitrary sizes, so messages could " -"be made constant\n" -"size or garlic messages could be modified randomly so that some cloves " -"appear to contain\n" -"more subcloves than they actually do. At the moment, however, garlic, " -"tunnel, and \n" +"support securely padding messages to arbitrary sizes, so messages could be made constant\n" +"size or garlic messages could be modified randomly so that some cloves appear to contain\n" +"more subcloves than they actually do. At the moment, however, garlic, tunnel, and \n" "end to end messages include simple random padding." msgstr "" @@ -12131,18 +10380,14 @@ msgid "" "In addition to the floodfill DOS attacks described\n" "above, floodfill routers are uniquely positioned\n" "to learn about network participants, due to their role\n" -"in the netDb, and the high frequency of communication with those " -"participants.\n" -"This is somewhat mitigated because floodfill routers only manage a " -"portion\n" +"in the netDb, and the high frequency of communication with those participants.\n" +"This is somewhat mitigated because floodfill routers only manage a portion\n" "of the total keyspace, and the keyspace rotates daily, as explained \n" "on the network database page.\n" -"The specific mechanisms by which routers communicate with floodfills have" -" been\n" +"The specific mechanisms by which routers communicate with floodfills have been\n" "carefully designed.\n" "However, these threats should be studied further.\n" -"The specific potential threats and corresponding defenses are a topic for" -" future research." +"The specific potential threats and corresponding defenses are a topic for future research." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:812 @@ -12161,33 +10406,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:826 msgid "" -"There are a few centralized or limited resources (some inside I2P, some " -"not)\n" +"There are a few centralized or limited resources (some inside I2P, some not)\n" "that could be attacked or used as a vector for attacks.\n" -"The absence of jrandom starting November 2007, followed by the loss of " -"the i2p.net hosting service in January 2008,\n" -"highlighted numerous centralized resources in the development and " -"operation of the I2P network,\n" +"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n" +"highlighted numerous centralized resources in the development and operation of the I2P network,\n" "most of which are now distributed.\n" -"Attacks on externally-reachable resources mainly affect the ability of " -"new users to find us,\n" +"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n" "not the operation of the network itself." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:836 #, python-format msgid "" -"The website is mirrored and uses DNS round-robin" -" for external public access." +"The website is mirrored and uses DNS round-robin " +"for external public access." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:839 #, python-format msgid "" -"Routers now support multiple external reseed " -"locations,\n" -"however more reseed hosts may be needed, and the handling of unreliable " -"or malicious\n" +"Routers now support multiple external reseed locations,\n" +"however more reseed hosts may be needed, and the handling of unreliable or malicious\n" "reseed hosts may need improvement." msgstr "" @@ -12203,10 +10442,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:851 msgid "" -"Routers now better handle multiple unreliable " -"floodfill peers.\n" -"Malicious floodfills needs more study." +"Routers now better handle multiple unreliable floodfill peers.\n" +"Malicious floodfills needs more study." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:855 @@ -12218,47 +10455,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:858 msgid "" -"Routers rely on a single news host, but there is a hardcoded backup URL " -"pointing to a different host.\n" +"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:862 #, python-format msgid "" -"Naming system services, including address book" -" subscription providers, add-host services,\n" -"and jump services, could be malicious. Substantial protections for " -"subscriptions were implemented\n" -"in release 0.6.1.31, with additional enhancements in subsequent releases." -"\n" +"Naming system services, including address book subscription providers, add-host services,\n" +"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n" +"in release 0.6.1.31, with additional enhancements in subsequent releases.\n" "However, all naming services require some measure of trust, see\n" "the naming page for details." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:869 msgid "" -"We remain reliant on the DNS service for i2p2.de, losing this would cause" -" substantial\n" +"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n" "disruption in our ability to attract new users,\n" -"and would shrink the network (in the short-to-medium term), just as the " -"loss of i2p.net did." +"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:881 msgid "" -"These attacks aren't directly on the network, but instead go after its " -"development team \n" -"by either introducing legal hurdles on anyone contributing to the " -"development\n" -"of the software, or by using whatever means are available to get the " -"developers to \n" -"subvert the software. Traditional technical measures cannot defeat these" -" attacks, and\n" -"if someone threatened the life or livelihood of a developer (or even just" -" issuing a \n" -"court order along with a gag order, under threat of prison), we would " -"have a big problem." +"These attacks aren't directly on the network, but instead go after its development team \n" +"by either introducing legal hurdles on anyone contributing to the development\n" +"of the software, or by using whatever means are available to get the developers to \n" +"subvert the software. Traditional technical measures cannot defeat these attacks, and\n" +"if someone threatened the life or livelihood of a developer (or even just issuing a \n" +"court order along with a gag order, under threat of prison), we would have a big problem." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:890 @@ -12268,26 +10493,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:894 #, python-format msgid "" -"All components of the network must be open source to enable inspection, " -"verification, \n" -"modification, and improvement. If a developer is compromised, once it is" -" noticed \n" -"the community should demand explanation and cease to accept that " -"developer's work.\n" -"All checkins to our distributed source control " -"system\n" -"are cryptographically signed, and the release packagers use a trust-list " -"system\n" +"All components of the network must be open source to enable inspection, verification, \n" +"modification, and improvement. If a developer is compromised, once it is noticed \n" +"the community should demand explanation and cease to accept that developer's work.\n" +"All checkins to our distributed source control system\n" +"are cryptographically signed, and the release packagers use a trust-list system\n" "to restrict modifications to those previously approved." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:902 #, python-format msgid "" -"Development over the network itself, allowing developers to stay " -"anonymous but still \n" -"secure the development process. All I2P development can occur through " -"I2P - using\n" +"Development over the network itself, allowing developers to stay anonymous but still \n" +"secure the development process. All I2P development can occur through I2P - using\n" "a distributed source control system,\n" "a distributed source control system, IRC chat,\n" "public web servers,\n" @@ -12297,8 +10515,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:913 msgid "" -"We also maintain relationships with various organizations that offer " -"legal advice,\n" +"We also maintain relationships with various organizations that offer legal advice,\n" "should any defense be necessary." msgstr "" @@ -12308,52 +10525,38 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:922 msgid "" -"Try as we might, most nontrivial applications include errors in the " -"design or \n" -"implementation, and I2P is no exception. There may be bugs that could be" -" exploited to \n" -"attack the anonymity or security of the communication running over I2P in" -" unexpected \n" -"ways. To help withstand attacks against the design or protocols in use, " -"we publish \n" +"Try as we might, most nontrivial applications include errors in the design or \n" +"implementation, and I2P is no exception. There may be bugs that could be exploited to \n" +"attack the anonymity or security of the communication running over I2P in unexpected \n" +"ways. To help withstand attacks against the design or protocols in use, we publish \n" "all designs and documentation and solicit review and criticism with \n" "the hope that many eyes will improve the system.\n" "We do not believe in\n" -"security through " -"obscurity." +"security through obscurity." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:933 msgid "" "In addition, the code is being \n" -"treated the same way, with little aversion towards reworking or throwing " -"out \n" -"something that isn't meeting the needs of the software system (including " -"ease of \n" -"modification). Documentation for the design and implementation of the " -"network and \n" -"the software components are an essential part of security, as without " -"them it is \n" -"unlikely that developers would be willing to spend the time to learn the " -"software \n" +"treated the same way, with little aversion towards reworking or throwing out \n" +"something that isn't meeting the needs of the software system (including ease of \n" +"modification). Documentation for the design and implementation of the network and \n" +"the software components are an essential part of security, as without them it is \n" +"unlikely that developers would be willing to spend the time to learn the software \n" "enough to identify shortcomings and bugs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:943 msgid "" -"Our software is likely, in particular, to contain bugs related to denial " -"of service\n" -"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues " -"in the router console,\n" -"and other vulnerabilities to non-standard inputs via the various " -"protocols." +"Our software is likely, in particular, to contain bugs related to denial of service\n" +"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,\n" +"and other vulnerabilities to non-standard inputs via the various protocols." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:949 #, python-format msgid "" -"I2P is still a small network with a small development community and " -"almost no\n" +"I2P is still a small network with a small development community and almost no\n" "interest from academic or research groups.\n" "Therefore we lack the analysis that\n" "other anonymity networks\n" @@ -12367,18 +10570,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" -"To some extent, I2P could be enhanced to avoid peers operating at IP " -"addresses\n" -"listed in a blocklist. Several blocklists are commonly available in " -"standard formats,\n" -"listing anti-P2P organizations, potential state-level adversaries, and " -"others." +"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n" +"listed in a blocklist. Several blocklists are commonly available in standard formats,\n" +"listing anti-P2P organizations, potential state-level adversaries, and others." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:969 msgid "" -"To the extent that active peers actually do show up in the actual " -"blocklist,\n" +"To the extent that active peers actually do show up in the actual blocklist,\n" "blocking by only a subset of peers would tend to segment the network,\n" "exacerbate reachability problems, and decrease overall reliability.\n" "Therefore we would want to agree on a particular blocklist and\n" @@ -12387,8 +10586,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:977 msgid "" -"Blocklists are only a part (perhaps a small part) of an array of defenses" -"\n" +"Blocklists are only a part (perhaps a small part) of an array of defenses\n" "against maliciousness.\n" "In large part the profiling system does a good job of measuring\n" "router behavior so that we don't need to trust anything in netDb.\n" @@ -12401,8 +10599,7 @@ msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" "central resource attack.\n" -"Automatic subscription to a list gives the list provider the power to " -"shut\n" +"Automatic subscription to a list gives the list provider the power to shut\n" "the i2p network down. Completely." msgstr "" @@ -12411,8 +10608,7 @@ msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" "There is no automatic update mechanism.\n" -"Should a particular IP range implement serious attacks on the I2P " -"network,\n" +"Should a particular IP range implement serious attacks on the I2P network,\n" "we would have to ask people to update their blocklist manually through\n" "out-of-band mechanisms such as forums, blogs, etc." msgstr "" @@ -12427,30 +10623,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:7 msgid "" -"This page contains an overview of I2P tunnel terminology and operation, " -"with\n" +"This page contains an overview of I2P tunnel terminology and operation, with\n" "links to more technical pages, details, and specifications." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:12 #, python-format msgid "" -"As briefly explained in the introduction, I2P " -"builds virtual \"tunnels\" -\n" -"temporary and unidirectional paths through a sequence of routers. These" -" \n" +"As briefly explained in the introduction, I2P builds virtual \"tunnels\" -\n" +"temporary and unidirectional paths through a sequence of routers. These \n" "tunnels are classified as either inbound tunnels (where everything \n" "given to it goes towards the creator of the tunnel) or outbound tunnels\n" "(where the tunnel creator shoves messages away from them). When Alice\n" "wants to send a message to Bob, she will (typically) send it out one of\n" -"her existing outbound tunnels with instructions for that tunnel's " -"endpoint\n" +"her existing outbound tunnels with instructions for that tunnel's endpoint\n" "to forward it to the gateway router for one of Bob's current inbound \n" "tunnels, which in turn passes it to Bob." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:25 -msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel" +msgid "" +"Alice connecting through her outbound tunnel to Bob via his inbound tunnel" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:27 @@ -12486,8 +10679,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:38 #, python-format msgid "" -"Tunnel gateway - the first router in a tunnel. For inbound " -"tunnels,\n" +"Tunnel gateway - the first router in a tunnel. For inbound tunnels,\n" "this is the one mentioned in the LeaseSet published in the\n" "network database. For outbound tunnels, the\n" "gateway is the originating router. (e.g. both A and D above)" @@ -12495,21 +10687,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:44 msgid "" -"Tunnel endpoint - the last router in a tunnel. (e.g. both C and F" -" above)" +"Tunnel endpoint - the last router in a tunnel. (e.g. both C and F " +"above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:45 msgid "" -"Tunnel participant - all routers in a tunnel except for the " -"gateway or\n" +"Tunnel participant - all routers in a tunnel except for the gateway or\n" "endpoint (e.g. both B and E above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:49 msgid "" -"n-Hop tunnel - a tunnel with a specific number of inter-router " -"jumps, e.g.:" +"n-Hop tunnel - a tunnel with a specific number of inter-router jumps," +" e.g.:" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:51 @@ -12524,8 +10715,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:53 msgid "" -"2-(or more)-hop tunnel - a tunnel where there is at least one " -"intermediate\n" +"2-(or more)-hop tunnel - a tunnel where there is at least one intermediate\n" "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n" "outbound from Alice, one inbound to Bob)" msgstr "" @@ -12533,10 +10723,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:60 #, python-format msgid "" -"Tunnel ID - A 4 " -"byte integer\n" -"different for each hop in a tunnel, and unique among all tunnels on a " -"router.\n" +"Tunnel ID - A 4 byte integer\n" +"different for each hop in a tunnel, and unique among all tunnels on a router.\n" "Chosen randomly by the tunnel creator." msgstr "" @@ -12547,8 +10735,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:68 #, python-format msgid "" -"Routers performing the three roles (gateway, participant, endpoint) are " -"given\n" +"Routers performing the three roles (gateway, participant, endpoint) are given\n" "different pieces of data in the initial\n" "Tunnel Build Message\n" "to accomplish their tasks:" @@ -12562,9 +10749,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:97 #, python-format msgid "" -"tunnel encryption key - an AES private key for " -"encrypting\n" +"tunnel encryption key - an AES private key for encrypting\n" "messages and instructions to the next hop" msgstr "" @@ -12572,9 +10757,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:101 #, python-format msgid "" -"tunnel IV key - an AES private key for " -"double-encrypting\n" +"tunnel IV key - an AES private key for double-encrypting\n" "the IV to the next hop" msgstr "" @@ -12582,9 +10765,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:105 #, python-format msgid "" -"reply key - an AES public key for " -"encrypting\n" +"reply key - an AES public key for encrypting\n" "the reply to the tunnel build request" msgstr "" @@ -12601,8 +10782,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:91 msgid "" -"next hop - what router is the next one in the path (unless this is" -" a 0-hop tunnel, and the gateway is also the endpoint)" +"next hop - what router is the next one in the path (unless this is a " +"0-hop tunnel, and the gateway is also the endpoint)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:92 @@ -12629,27 +10810,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:117 #, python-format msgid "" -"tunnel encryption key - an AES private key for " -"encrypting\n" +"tunnel encryption key - an AES private key for encrypting\n" "messages and instructions to the the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:121 #, python-format msgid "" -"tunnel IV key - an AES private key for " -"double-encrypting\n" +"tunnel IV key - an AES private key for double-encrypting\n" "the IV to the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:125 #, python-format msgid "" -"reply key - an AES public key for " -"encrypting\n" +"reply key - an AES public key for encrypting\n" "the reply to the tunnel build request (outbound endpoints only)" msgstr "" @@ -12665,8 +10840,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:131 msgid "" -"reply router - the inbound gateway of the tunnel to send the reply" -" through (outbound endpoints only)" +"reply router - the inbound gateway of the tunnel to send the reply " +"through (outbound endpoints only)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:132 @@ -12689,8 +10864,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:143 #, python-format msgid "" -"Several tunnels for a particular purpose may be grouped into a \"tunnel " -"pool\",\n" +"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n" "as described in the\n" "tunnel specification.\n" "This provides redundancy and additional bandwidth.\n" @@ -12705,20 +10879,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:155 #, python-format msgid "" -"As mentioned above, each client requests that their router provide " -"tunnels to\n" +"As mentioned above, each client requests that their router provide tunnels to\n" "include at least a certain number of hops.\n" "The decision as to how many routers\n" -"to have in one's outbound and inbound tunnels has an important effect " -"upon the\n" -"latency, throughput, reliability, and anonymity provided by I2P - the " -"more peers\n" -"that messages have to go through, the longer it takes to get there and " -"the more\n" -"likely that one of those routers will fail prematurely. The less routers" -" in a\n" -"tunnel, the easier it is for an adversary to mount traffic analysis " -"attacks and\n" +"to have in one's outbound and inbound tunnels has an important effect upon the\n" +"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n" +"that messages have to go through, the longer it takes to get there and the more\n" +"likely that one of those routers will fail prematurely. The less routers in a\n" +"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n" "pierce someone's anonymity.\n" "Tunnel lengths are specified by clients via\n" "I2CP options.\n" @@ -12732,18 +10900,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:172 msgid "" "With no remote routers in a tunnel, the user has very basic plausible\n" -"deniability (since no one knows for sure that the peer that sent them the" -"\n" -"message wasn't simply just forwarding it on as part of the tunnel). " -"However, it\n" -"would be fairly easy to mount a statistical analysis attack and notice " -"that\n" -"messages targeting a specific destination are always sent through a " -"single\n" -"gateway. Statistical analysis against outbound 0-hop tunnels are more " -"complex,\n" -"but could show similar information (though would be slightly harder to " -"mount)." +"deniability (since no one knows for sure that the peer that sent them the\n" +"message wasn't simply just forwarding it on as part of the tunnel). However, it\n" +"would be fairly easy to mount a statistical analysis attack and notice that\n" +"messages targeting a specific destination are always sent through a single\n" +"gateway. Statistical analysis against outbound 0-hop tunnels are more complex,\n" +"but could show similar information (though would be slightly harder to mount)." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:182 @@ -12754,14 +10916,10 @@ msgstr "" #, python-format msgid "" "With only one remote router in a tunnel, the user has both plausible\n" -"deniability and basic anonymity, as long as they are not up against an " -"internal\n" -"adversary (as described on threat model)." -" However,\n" -"if the adversary ran a sufficient number of routers such that the single " -"remote\n" -"router in the tunnel is often one of those compromised ones, they would " -"be able\n" +"deniability and basic anonymity, as long as they are not up against an internal\n" +"adversary (as described on threat model). However,\n" +"if the adversary ran a sufficient number of routers such that the single remote\n" +"router in the tunnel is often one of those compromised ones, they would be able\n" "to mount the above statistical traffic analysis attack." msgstr "" @@ -12771,10 +10929,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:193 msgid "" -"With two or more remote routers in a tunnel, the costs of mounting the " -"traffic\n" -"analysis attack increases, since many remote routers would have to be " -"compromised\n" +"With two or more remote routers in a tunnel, the costs of mounting the traffic\n" +"analysis attack increases, since many remote routers would have to be compromised\n" "to mount it." msgstr "" @@ -12788,8 +10944,7 @@ msgid "" "To reduce the susceptibility to some attacks,\n" "3 or more hops are recommended for the highest level of protection.\n" "Recent studies\n" -"also conclude that more than 3 hops does not provide additional " -"protection." +"also conclude that more than 3 hops does not provide additional protection." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:208 @@ -12813,15 +10968,12 @@ msgstr "" #, python-format msgid "" "All tunnels are periodically tested by their creator by sending a\n" -"DeliveryStatusMessage out an outbound tunnel and bound for another " -"inbound tunnel\n" -"(testing both tunnels at once). If either fails a number of consecutive " -"tests, it is marked as no longer\n" +"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n" +"(testing both tunnels at once). If either fails a number of consecutive tests, it is marked as no longer\n" "functional. If it was used for a client's inbound tunnel, a new leaseSet\n" "is created.\n" "Tunnel test failures are also reflected in the\n" -"capacity rating in the peer " -"profile." +"capacity rating in the peer profile." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:230 @@ -12831,14 +10983,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:231 #, python-format msgid "" -"Tunnel creation is handled by garlic " -"routing\n" -"a Tunnel Build Message to a router, requesting that they participate in " -"the\n" -"tunnel (providing them with all of the appropriate information, as above," -" along\n" -"with a certificate, which right now is a 'null' cert, but will support " -"hashcash\n" +"Tunnel creation is handled by garlic routing\n" +"a Tunnel Build Message to a router, requesting that they participate in the\n" +"tunnel (providing them with all of the appropriate information, as above, along\n" +"with a certificate, which right now is a 'null' cert, but will support hashcash\n" "or other non-free certificates when necessary).\n" "That router forwards the message to the next hop in the tunnel.\n" "Details are in the\n" @@ -12848,8 +10996,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:245 #, python-format msgid "" -"Multi-layer encryption is handled by garlic" -" encryption\n" +"Multi-layer encryption is handled by garlic encryption\n" "of tunnel messages.\n" "Details are in the\n" "tunnel specification.\n" @@ -12870,8 +11017,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:267 msgid "" "In a distant future release,\n" -"options specifying the pooling, mixing, and chaff generation settings may" -" be implemented." +"options specifying the pooling, mixing, and chaff generation settings may be implemented." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:272 @@ -12902,7 +11048,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:292 msgid "Garlic routing" -msgstr "" +msgstr "التوجيه الثومي" #: i2p2www/pages/site/docs/how/tunnel-routing.html:294 msgid "ElGamal/AES+SessionTag" @@ -12914,20 +11060,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:6 msgid "" -"The I2P Client Protocol (I2CP) exposes a strong separation of concerns " -"between\n" -"the router and any client that wishes to communicate over the network. " -"It enables\n" -"secure and asynchronous messaging by sending and receiving messages over " -"a \n" +"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n" +"the router and any client that wishes to communicate over the network. It enables\n" +"secure and asynchronous messaging by sending and receiving messages over a \n" "single TCP socket.\n" "With I2CP, a client application tells the\n" -"router who they are (their \"destination\"), what anonymity, reliability," -" and \n" -"latency tradeoffs to make, and where to send messages. In turn the " -"router uses\n" -"I2CP to tell the client when any messages have arrived, and to request " -"authorization\n" +"router who they are (their \"destination\"), what anonymity, reliability, and \n" +"latency tradeoffs to make, and where to send messages. In turn the router uses\n" +"I2CP to tell the client when any messages have arrived, and to request authorization\n" "for some tunnels to be used." msgstr "" @@ -12936,10 +11076,8 @@ msgstr "" msgid "" "The protocol itself is implemented in Java, to provide the\n" "Client SDK.\n" -"This SDK is exposed in the i2p.jar package, which implements the client-" -"side of I2CP.\n" -"Clients should never need to access the router.jar package, which " -"contains the\n" +"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n" +"Clients should never need to access the router.jar package, which contains the\n" "router itself and the router-side of I2CP.\n" "There is also a C library implementation.\n" "A non-Java client would also have to implement the\n" @@ -12950,45 +11088,35 @@ msgstr "" #, python-format msgid "" "Applications can take advantage of the base I2CP plus the \n" -"streaming and datagram libraries\n" -"by using the Simple Anonymous Messaging or BOB protocols,\n" +"streaming and datagram libraries\n" +"by using the Simple Anonymous Messaging or BOB protocols,\n" "which do not require clients to deal with any sort of cryptography.\n" "Also, clients may access the network by one of several proxies -\n" "HTTP, CONNECT, and SOCKS 4/4a/5.\n" -"Alternatively, Java clients may access those libraries in " -"ministreaming.jar and streaming.jar.\n" +"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n" "So there are several options for both Java and non-Java applications." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:43 #, python-format msgid "" -"Client-side end-to-end encryption (encrypting the data over the I2CP " -"connection)\n" +"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n" "was disabled in I2P release 0.6,\n" -"leaving in place the ElGamal/AES end-to-end " -"encryption\n" +"leaving in place the ElGamal/AES end-to-end encryption\n" "which is implemented in the router.\n" "The only cryptography that client libraries must still implement is\n" "DSA public/private key signing\n" "for LeaseSets and\n" -"Session Configurations, and" -" management of those keys." +"Session Configurations, and management of those keys." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:56 msgid "" -"In a standard I2P installation, port 7654 is used by external java " -"clients to communicate\n" +"In a standard I2P installation, port 7654 is used by external java clients to communicate\n" "with the local router via I2CP.\n" -"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, " -"set the\n" -"router advanced configuration option " -"i2cp.tcp.bindAllInterfaces=true and restart.\n" -"Clients in the same JVM as the router pass messages directly to the " -"router\n" +"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n" +"router advanced configuration option i2cp.tcp.bindAllInterfaces=true and restart.\n" +"Clients in the same JVM as the router pass messages directly to the router\n" "through an internal JVM interface." msgstr "" @@ -12996,13 +11124,10 @@ msgstr "" #, python-format msgid "" "The router also supports external connections over SSL.\n" -"While SSL is not the default, it is strongly recommended for any traffic " -"that may\n" -"be exposed to the open Internet. The authorization user/password (if " -"any), the\n" +"While SSL is not the default, it is strongly recommended for any traffic that may\n" +"be exposed to the open Internet. The authorization user/password (if any), the\n" "Private Key and\n" -"Signing Private " -"Key for the\n" +"Signing Private Key for the\n" "Destination\n" "are all transmitted in-the-clear unless SSL is enabled." msgstr "" @@ -13023,19 +11148,12 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:82 #, python-format msgid "" -"When a client connects to the router, it first sends a single protocol " -"version byte (0x2A).\n" -"Then it sends a GetDate Message and " -"waits for the SetDate Message " -"response.\n" -"Next, it sends a CreateSession " -"Message containing the session configuration.\n" -"It next awaits a RequestLeaseSet" -" Message from the router, indicating that inbound tunnels\n" -"have been built, and responds with a CreateLeaseSetMessage containing the" -" signed LeaseSet.\n" -"The client may now initiate or receive connections from other I2P " -"destinations." +"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n" +"Then it sends a GetDate Message and waits for the SetDate Message response.\n" +"Next, it sends a CreateSession Message containing the session configuration.\n" +"It next awaits a RequestLeaseSet Message from the router, indicating that inbound tunnels\n" +"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n" +"The client may now initiate or receive connections from other I2P destinations." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:91 @@ -13051,10 +11169,7 @@ msgstr "" #, python-format msgid "" "The following options are traditionally passed to the router via\n" -"a SessionConfig contained " -"in a CreateSession Message or " -"a ReconfigureSession " -"Message." +"a SessionConfig contained in a CreateSession Message or a ReconfigureSession Message." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:104 @@ -13087,14 +11202,13 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:167 msgid "" "Number of ElGamal/AES Session Tags to send at a time.\n" -"For clients with relatively low bandwidth per-client-pair (IRC, some UDP " -"apps), this may be set lower." +"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:179 msgid "" -"Comma-separated list of Base 64 Hashes of peers to build tunnels through;" -" for debugging only" +"Comma-separated list of Base 64 Hashes of peers to build tunnels through; " +"for debugging only" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:188 @@ -13111,17 +11225,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:322 msgid "" "Guaranteed is disabled;\n" -"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1," -" the client side default is None as of 0.9.4" +"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:334 msgid "" "For authorization, if required by the router.\n" -"If the client is running in the same JVM as a router, this option is not " -"required.\n" -"Warning - username and password are sent in the clear to the router, " -"unless using SSL (i2cp.SSL=true).\n" +"If the client is running in the same JVM as a router, this option is not required.\n" +"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n" "Authorization is only recommended when using SSL." msgstr "" @@ -13195,8 +11306,7 @@ msgid "" "Random amount to add or subtract to the length of tunnels in.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" @@ -13205,16 +11315,14 @@ msgid "" "Random amount to add or subtract to the length of tunnels out.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:464 msgid "" "Name of tunnel - generally used in routerconsole, which will\n" -"use the first few characters of the Base64 hash of the destination by " -"default." +"use the first few characters of the Base64 hash of the destination by default." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:476 @@ -13230,8 +11338,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:497 msgid "" "Number of tunnels in.\n" -"Limit was increased from 6 to 16 in release 0.9; however, numbers higher " -"than 6 are\n" +"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n" "incompatible with older releases." msgstr "" @@ -13246,32 +11353,27 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:538 msgid "" "Any other options prefixed with \"inbound.\" are stored\n" -"in the \"unknown options\" properties of the inbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the inbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:550 msgid "" "Any other options prefixed with \"outbound.\" are stored\n" -"in the \"unknown options\" properties of the outbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the outbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:562 msgid "" "Set to false to disable ever bundling a reply LeaseSet.\n" "For clients that do not publish their LeaseSet, this option must be true\n" -"for any reply to be possible. \"true\" is also recommended for multihomed" -" servers\n" +"for any reply to be possible. \"true\" is also recommended for multihomed servers\n" "with long connection times." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:569 msgid "" -"Setting to \"false\" may save significant outbound bandwidth, especially " -"if\n" -"the client is configured with a large number of inbound tunnels (Leases)." -"\n" +"Setting to \"false\" may save significant outbound bandwidth, especially if\n" +"the client is configured with a large number of inbound tunnels (Leases).\n" "If replies are still required, this may shift the bandwidth burden to\n" "the far-end client and the floodfill.\n" "There are several cases where \"false\" may be appropriate:" @@ -13287,14 +11389,10 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:579 msgid "" -"LeaseSet is published, client is a \"server\", all connections are " -"inbound\n" -"so the connecting far-end destination obviously has the leaseset already." -"\n" -"Connections are either short, or it is acceptable for latency on a long-" -"lived\n" -"connection to temporarily increase while the other end re-fetches the " -"LeaseSet\n" +"LeaseSet is published, client is a \"server\", all connections are inbound\n" +"so the connecting far-end destination obviously has the leaseset already.\n" +"Connections are either short, or it is acceptable for latency on a long-lived\n" +"connection to temporarily increase while the other end re-fetches the LeaseSet\n" "after expiration.\n" "HTTP servers may fit these requirements." msgstr "" @@ -13308,15 +11406,11 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:596 #, python-format msgid "" -"Note: As of release 0.7.7, option names and values must use UTF-8 " -"encoding.\n" +"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n" "This is primarily useful for nicknames.\n" -"Prior to that release, options with multi-byte characters were corrupted." -"\n" -"Since options are encoded in a Mapping,\n" -"all option names and values are limited to 255 bytes (not characters) " -"maximum." +"Prior to that release, options with multi-byte characters were corrupted.\n" +"Since options are encoded in a Mapping,\n" +"all option names and values are limited to 255 bytes (not characters) maximum." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:610 @@ -13327,8 +11421,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:611 msgid "" "The following options are interpreted on the client side,\n" -"and will be interpreted if passed to the I2PSession via the " -"I2PClient.createSession() call.\n" +"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n" "The streaming lib should also pass these options through to I2CP.\n" "Other implementations may have different defaults." msgstr "" @@ -13404,28 +11497,24 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:871 msgid "" "Connect to the router using SSL.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:883 msgid "" "Router hostname.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:895 msgid "" "Router I2CP port.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:902 msgid "" -"Note: All arguments, including numbers, are strings. True/false values " -"are case-insensitive strings.\n" +"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n" "Anything other than case-insensitive \"true\" is interpreted as false.\n" "All option names are case-sensitive." msgstr "" @@ -13437,28 +11526,22 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:909 #, python-format msgid "" -"The end-to-end messages handled by I2CP (i.e. the data sent by the client" -" in a\n" +"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n" "SendMessageMessage\n" "and received by the client in a\n" "MessagePayloadMessage)\n" "are gzipped with a standard 10-byte gzip\n" "header beginning with 0x1F 0x8B 0x08 as\n" -"specified by RFC " -"1952.\n" -"As of release 0.7.1, I2P uses ignored portions of the gzip header to " -"include\n" -"protocol, from-port, and to-port information, thus supporting streaming " -"and\n" -"datagrams on the same destination, and allowing query/response using " -"datagrams\n" +"specified by RFC 1952.\n" +"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n" +"protocol, from-port, and to-port information, thus supporting streaming and\n" +"datagrams on the same destination, and allowing query/response using datagrams\n" "to work reliably in the presence of multiple channels." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:923 msgid "" -"The gzip function cannot be completely turned off, however setting " -"i2cp.gzip=false\n" +"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n" "turns the gzip effort setting to 0, which may save a little CPU." msgstr "" @@ -13492,7 +11575,8 @@ msgid "Gzip xflags" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:960 -msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" +msgid "" +"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:969 @@ -13517,8 +11601,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:987 #, python-format msgid "" -"Some improvements may be able to use messages previously defined but not " -"implemented.\n" +"Some improvements may be able to use messages previously defined but not implemented.\n" "For reference, here is the\n" "I2CP Protocol Specification Version 0.9\n" "(PDF) dated August 28, 2003.\n" @@ -13537,12 +11620,9 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:6 msgid "" "The I2P Network Protocol (I2NP),\n" -"which is sandwiched between I2CP and the various I2P transport protocols," -" manages the\n" -"routing and mixing of messages between routers, as well as the selection " -"of what\n" -"transports to use when communicating with a peer for which there are " -"multiple\n" +"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n" +"routing and mixing of messages between routers, as well as the selection of what\n" +"transports to use when communicating with a peer for which there are multiple\n" "common transports supported." msgstr "" @@ -13552,20 +11632,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:15 msgid "" -"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-" -"router, point-to-point messages.\n" -"By encrypting and wrapping messages in other messages, they can be sent " -"in a secure way\n" +"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n" +"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n" "through multiple hops to the ultimate destination.\n" -"Priority is only used locally at the origin, i.e. when queuing for " -"outbound delivery." +"Priority is only used locally at the origin, i.e. when queuing for outbound delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:22 #, python-format msgid "" -"The priorities listed below may not be current and are subject to change." -"\n" +"The priorities listed below may not be current and are subject to change.\n" "See the OutNetMessage Javadocs\n" "for the current priority settings.\n" "Priority queueing implementation may vary." @@ -13577,8 +11653,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:31 msgid "" -"The following table specifies the traditional 16-byte header used in " -"NTCP.\n" +"The following table specifies the traditional 16-byte header used in NTCP.\n" "The SSU and NTCP2 transports use modified headers." msgstr "" @@ -13615,23 +11690,18 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:46 #, python-format msgid "" -"While the maximum payload size is nominally 64KB, the size is further " -"constrained by the\n" -"method of fragmenting I2NP messages into multiple 1KB tunnel messages as " -"described on\n" +"While the maximum payload size is nominally 64KB, the size is further constrained by the\n" +"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n" "the tunnel implementation page.\n" -"The maximum number of fragments is 64, and the message may not be " -"perfectly aligned,\n" +"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n" "So the message must nominally fit in 63 fragments." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:54 msgid "" -"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL " -"delivery mode);\n" +"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n" "the maximum size of a follow-on fragment is 996 bytes.\n" -"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 " -"bytes, or 61.2 KB." +"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:60 @@ -13639,16 +11709,13 @@ msgid "" "In addition, the transports may have additional restrictions.\n" "The NTCP limit is 16KB - 6 = 16378 bytes.\n" "The SSU limit is approximately 32 KB.\n" -"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher" -" than what a tunnel can support." +"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:67 msgid "" -"Note that these are not the limits for datagrams that the client sees, as" -" the\n" -"router may bundle a reply leaseset and/or session tags together with the " -"client message\n" +"Note that these are not the limits for datagrams that the client sees, as the\n" +"router may bundle a reply leaseset and/or session tags together with the client message\n" "in a garlic message. The leaseset and tags together may add about 5.5KB.\n" "Therefore the current datagram limit is about 10KB. This limit will be\n" "increased in a future release." @@ -13705,8 +11772,7 @@ msgid "" "Priority may vary.\n" "Size is 898 bytes for a typical 2-lease leaseSet.\n" "RouterInfo structures are compressed, and size varies; however\n" -"there is a continuing effort to reduce the amount of data published in a " -"RouterInfo\n" +"there is a continuing effort to reduce the amount of data published in a RouterInfo\n" "as we approach release 1.0." msgstr "" @@ -13716,8 +11782,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:150 msgid "" -"Used for message replies, and for testing tunnels - generally wrapped in " -"a GarlicMessage" +"Used for message replies, and for testing tunnels - generally wrapped in a " +"GarlicMessage" msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:158 @@ -13728,8 +11794,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:185 msgid "" -"The most common message. Priority for tunnel participants, outbound " -"endpoints, and inbound gateways was\n" +"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n" "reduced to 200 as of release 0.6.1.33.\n" "Outbound gateway messages (i.e. those originated locally) remains at 400." msgstr "" @@ -13760,16 +11825,13 @@ msgstr "" msgid "" "On the I2NP Specification page.\n" "See also the\n" -"Common Data Structure Specification " -"page." +"Common Data Structure Specification page." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:234 msgid "" -"It isn't clear whether the current priority scheme is generally " -"effective,\n" -"and whether the priorities for various messages should be adjusted " -"further.\n" +"It isn't clear whether the current priority scheme is generally effective,\n" +"and whether the priorities for various messages should be adjusted further.\n" "This is a topic for further research, analysis and testing." msgstr "" @@ -13787,8 +11849,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:12 msgid "" "Each of the layers in the stack provides extra capabilities.\n" -"The capabilities are listed below, starting at the bottom of the protocol" -" stack." +"The capabilities are listed below, starting at the bottom of the protocol stack." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:18 @@ -13797,8 +11858,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:20 msgid "" -"IP: Internet Protocol, allow addressing hosts on the regular internet and" -" routing packets across the internet using best-effort delivery." +"IP: Internet Protocol, allow addressing hosts on the regular internet and " +"routing packets across the internet using best-effort delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:23 @@ -13819,11 +11880,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:30 msgid "" -"I2P Transport Layer: provide encrypted connections between 2 I2P " -"routers. These are not anonymous yet, this is strictly a hop-to-hop " -"connection.\n" -"Two protocols are implemented to provide these capabilities. NTCP2 builds" -" on top of TCP, while SSU uses UDP." +"I2P Transport Layer: provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n" +"Two protocols are implemented to provide these capabilities. NTCP2 builds on top of TCP, while SSU uses UDP." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:35 @@ -13841,20 +11899,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:42 #, python-format msgid "" -"Tunnel messages: tunnel messages are " -"large messages containing encrypted I2NP (see below) messages and " -"encrypted instructions for their delivery.\n" -"The encryption is layered. The first hop will decrypt the tunnel message " -"and read a part. Another part can still be encrypted (with another key)," -"\n" +"Tunnel messages: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n" +"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n" "so it will be forwarded." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:48 #, python-format msgid "" -"I2NP messages: I2P Network Protocol messages are" -" used to pass messages through multiple routers. These I2NP messages are " +"I2NP messages: I2P Network Protocol messages are " +"used to pass messages through multiple routers. These I2NP messages are " "combined in tunnel messages." msgstr "" @@ -13867,54 +11921,51 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:55 #, python-format msgid "" -"I2NP messages: I2P Network Protocol messages are" -" wrapped in each other and used to ensure encryption between two tunnels " -"and are passed along from source to destination, keeping both anonymous." +"I2NP messages: I2P Network Protocol messages are " +"wrapped in each other and used to ensure encryption between two tunnels and " +"are passed along from source to destination, keeping both anonymous." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:61 msgid "" -"The following layers are strictly speaking no longer part of the I2P " -"Protocol stack, they are not part of the core 'I2P router' functionality." -"\n" -"However, each of these layers adds additional functionality, to allow " -"applications simple and convenient I2P usage." +"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n" +"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:67 msgid "" -"I2P Client Layer: allow any client to use I2P functionality, " -"without requiring the direct use of the router API." +"I2P Client Layer: allow any client to use I2P functionality, without " +"requiring the direct use of the router API." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:69 #, python-format msgid "" "I2CP: I2P Client Protocol, allows secure and " -"asynchronous messaging over I2P by communicating messages over the I2CP " -"TCP socket." +"asynchronous messaging over I2P by communicating messages over the I2CP TCP " +"socket." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:74 msgid "" -"I2P End-to-end Transport Layer: allow TCP- or UDP-like " -"functionality on top of I2P." +"I2P End-to-end Transport Layer: allow TCP- or UDP-like functionality " +"on top of I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:76 #, python-format msgid "" -"Streaming Library: an implementation of " -"TCP-like streams over I2P. This allows easier porting of existing " -"applications to I2P." +"Streaming Library: an implementation of TCP-" +"like streams over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:80 #, python-format msgid "" "Datagram Library: an implementation of UDP-" -"like messages over I2P. This allows easier porting of existing " -"applications to I2P." +"like messages over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:85 @@ -13934,8 +11985,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:99 msgid "" -"Finally, what could be considered the 'I2P application layer', is " -"a large number of applications on top of I2P.\n" +"Finally, what could be considered the 'I2P application layer', is a large number of applications on top of I2P.\n" "We can order this based on the I2P stack layer they use." msgstr "" @@ -13984,12 +12034,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:8 msgid "" -"A \"transport\" in I2P is a method for direct, point-to-point " -"communication\n" +"A \"transport\" in I2P is a method for direct, point-to-point communication\n" "between two routers.\n" "Transports must provide confidentiality and integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" +"against external adversaries while authenticating that the router contacted \n" "is the one who should receive a given message." msgstr "" @@ -14043,8 +12091,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:44 msgid "" "Maintain a set of router addresses, one or more for each transport,\n" -"that the router publishes as its global contact information (the " -"RouterInfo).\n" +"that the router publishes as its global contact information (the RouterInfo).\n" "Each transport may connect using one of these addresses, which may be\n" "IPv4 or (as of version 0.9.8) IPv6." msgstr "" @@ -14073,10 +12120,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:55 msgid "" -"Maintenance of connection limits for each transport, implementation of " -"various thresholds for these limits,\n" -"and communication of threshold status to the router so it may make " -"operational changes based on the status" +"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n" +"and communication of threshold status to the router so it may make operational changes based on the status" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:59 @@ -14095,27 +12140,26 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:62 msgid "" -"Coordination of firewall status and local IP, and changes to either, " -"among the transports" +"Coordination of firewall status and local IP, and changes to either, among " +"the transports" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:63 #: i2p2www/pages/site/docs/transport/ssu.html:36 msgid "" -"Communication of firewall status and local IP, and changes to either, to " -"the router and the user interface" +"Communication of firewall status and local IP, and changes to either, to the" +" router and the user interface" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:64 msgid "" -"Determination of a consensus clock, which is used to periodically update " -"the router's clock, as a backup for NTP" +"Determination of a consensus clock, which is used to periodically update the" +" router's clock, as a backup for NTP" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:65 msgid "" -"Maintenance of status for each peer, including whether it is connected, " -"whether it was recently connected,\n" +"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n" "and whether it was reachable in the last attempt" msgstr "" @@ -14125,8 +12169,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:70 msgid "" -"Honoring the automated and manual lists of banned peers maintained by the" -" router,\n" +"Honoring the automated and manual lists of banned peers maintained by the router,\n" "and refusing outbound and inbound connections to those peers" msgstr "" @@ -14136,10 +12179,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:79 msgid "" -"The transport subsystem maintains a set of router addresses, each of " -"which lists a transport method, IP, and port.\n" -"These addresses constitute the advertised contact points, and are " -"published by the router to the network database.\n" +"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n" +"These addresses constitute the advertised contact points, and are published by the router to the network database.\n" "Addresses may also contain an arbitrary set of additional options." msgstr "" @@ -14160,16 +12201,13 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:92 #, python-format msgid "" -"A router is firewalled, and therefore publishes an SSU address which " -"contains a list of cooperating\n" -"peers or \"introducers\" who will assist in NAT traversal (see the SSU spec for details)" +"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n" +"peers or \"introducers\" who will assist in NAT traversal (see the SSU spec for details)" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:96 msgid "" -"A router is not firewalled or its NAT ports are open; it publishes both " -"NTCP and SSU addresses containing\n" +"A router is not firewalled or its NAT ports are open; it publishes both NTCP and SSU addresses containing\n" "directly-accessible IP and ports." msgstr "" @@ -14180,10 +12218,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:104 #, python-format msgid "" -"The transport system delivers I2NP messages " -"only. The transport selected for any message is\n" -"independent of the upper-layer protocols and contents (router or client " -"messages, whether an external application was using\n" +"The transport system delivers I2NP messages only. The transport selected for any message is\n" +"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n" "TCP or UDP to connect to I2P, whether the upper layer was using\n" "the streaming library\n" "streaming\n" @@ -14195,15 +12231,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:118 msgid "" -"For each outgoing message, the transport system solicits \"bids\" from " -"each transport.\n" -"The transport bidding the lowest (best) value wins the bid and receives " -"the message for delivery.\n" +"For each outgoing message, the transport system solicits \"bids\" from each transport.\n" +"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n" "A transport may refuse to bid." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:124 -msgid "Whether a transport bids, and with what value, depend on numerous factors:" +msgid "" +"Whether a transport bids, and with what value, depend on numerous factors:" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:128 @@ -14226,8 +12261,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:132 msgid "" -"The size of the message, as different transports have different size " -"limits" +"The size of the message, as different transports have different size limits" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:133 @@ -14237,7 +12271,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:134 -msgid "Whether the connection would be indirect (requiring introducers) or direct" +msgid "" +"Whether the connection would be indirect (requiring introducers) or direct" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:135 @@ -14246,8 +12281,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:138 msgid "" -"In general, the bid values are selected so that two routers are only " -"connected by a single transport\n" +"In general, the bid values are selected so that two routers are only connected by a single transport\n" "at any one time. However, this is not a requirement." msgstr "" @@ -14265,8 +12299,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:153 msgid "" -"An \"indirect\" transport for routers that are not reachable by all other" -" routers (one form of \"restricted routes\")" +"An \"indirect\" transport for routers that are not reachable by all other " +"routers (one form of \"restricted routes\")" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:154 @@ -14275,31 +12309,24 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:157 msgid "" -"Work continues on adjusting default connection limits for each transport." -"\n" -"I2P is designed as a \"mesh network\", where it is assumed that any " -"router can connect to any other router.\n" -"This assumption may be broken by routers that have exceeded their " -"connection limits, and by\n" +"Work continues on adjusting default connection limits for each transport.\n" +"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n" +"This assumption may be broken by routers that have exceeded their connection limits, and by\n" "routers that are behind restrictive state firewalls (restricted routes)." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:164 msgid "" -"The current connection limits are higher for SSU than for NTCP, based on " -"the assumption that\n" -"the memory requirements for an NTCP connection are higher than that for " -"SSU.\n" -"However, as NTCP buffers are partially in the kernel and SSU buffers are " -"on the Java heap,\n" +"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n" +"the memory requirements for an NTCP connection are higher than that for SSU.\n" +"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n" "that assumption is difficult to verify." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:171 #, python-format msgid "" -"Analyze Breaking and Improving Protocol " -"Obfuscation\n" +"Analyze Breaking and Improving Protocol Obfuscation\n" "and see how transport-layer padding may improve things." msgstr "" @@ -14315,8 +12342,7 @@ msgid "" "Support removed as of 0.9.50 2021-05.\n" "Replaced by NTCP2.\n" "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n" -"Java NIO (new I/O) does not suffer from the 1 thread per connection " -"issues of the old TCP transport.\n" +"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n" "NTCP-over-IPv6 is supported as of version 0.9.8." msgstr "" @@ -14331,8 +12357,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:27 msgid "" -"The NTCP code within I2P is relatively lightweight (1/4 the size of the " -"SSU code)\n" +"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n" "because it uses the underlying Java TCP transport for reliable delivery." msgstr "" @@ -14357,21 +12382,17 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:53 msgid "" "After establishment,\n" -"the NTCP transport sends individual I2NP messages, with a simple " -"checksum.\n" +"the NTCP transport sends individual I2NP messages, with a simple checksum.\n" "The unencrypted message is encoded as follows:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:71 msgid "" -"The data is then AES/256/CBC encrypted. The session key for the " -"encryption\n" +"The data is then AES/256/CBC encrypted. The session key for the encryption\n" "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n" -"The establishment between two routers is implemented in the " -"EstablishState class\n" +"The establishment between two routers is implemented in the EstablishState class\n" "and detailed below.\n" -"The IV for AES/256/CBC encryption is the last 16 bytes of the previous " -"encrypted message." +"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:79 @@ -14395,8 +12416,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:99 msgid "" -"Total length: 16 bytes. The time sync message is sent at approximately 15" -" minute intervals.\n" +"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n" "The message is encrypted just as standard messages are." msgstr "" @@ -14419,14 +12439,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:113 #: i2p2www/pages/site/docs/transport/ssu.html:189 msgid "" -"Idle timeout and connection close is at the discretion of each endpoint " -"and may vary.\n" -"The current implementation lowers the timeout as the number of " -"connections approaches the\n" -"configured maximum, and raises the timeout when the connection count is " -"low.\n" -"The recommended minimum timeout is two minutes or more, and the " -"recommended\n" +"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n" +"The current implementation lowers the timeout as the number of connections approaches the\n" +"configured maximum, and raises the timeout when the connection count is low.\n" +"The recommended minimum timeout is two minutes or more, and the recommended\n" "maximum timeout is ten minutes or more." msgstr "" @@ -14437,12 +12453,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:123 msgid "" "After establishment, and every 30-60 minutes thereafter,\n" -"the two routers should generally exchange RouterInfos using a " -"DatabaseStoreMessage.\n" -"However, Alice should check if the first queued message is a " -"DatabaseStoreMessage\n" -"so as not to send a duplicate message; this is often the case when " -"connecting to a floodfill router." +"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n" +"However, Alice should check if the first queued message is a DatabaseStoreMessage\n" +"so as not to send a duplicate message; this is often the case when connecting to a floodfill router." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:131 @@ -14451,11 +12464,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:132 msgid "" -"In the establish state, there is a 4-phase message sequence to exchange " -"DH keys and signatures.\n" +"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n" "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n" -"Then, signatures of the critical data are exchanged to confirm the " -"connection." +"Then, signatures of the critical data are exchanged to confirm the connection." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:148 @@ -14493,15 +12504,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:165 msgid "" "The DH key exchange consists of a number of steps, displayed below.\n" -"The mapping between these steps and the messages sent between I2P " -"routers,\n" +"The mapping between these steps and the messages sent between I2P routers,\n" "is marked in bold." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:171 msgid "" -"Alice generates a secret integer x. She then calculates X = g^x mod" -" p." +"Alice generates a secret integer x. She then calculates X = g^x mod " +"p." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:172 @@ -14535,8 +12545,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:179 #, python-format msgid "" -"The sessionKey is then used to exchange identities in Message 3 " -"and Message 4.\n" +"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n" "The exponent (x and y) length for the DH exchange is documented on the\n" "cryptography page." msgstr "" @@ -14549,8 +12558,7 @@ msgstr "" #, python-format msgid "" "This is the DH request. Alice already has Bob's\n" -"Router " -"Identity,\n" +"Router Identity,\n" "IP address, and port, as contained in his\n" "Router Info,\n" "which was published to the\n" @@ -14630,8 +12638,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:318 #, python-format msgid "" -"48 bytes AES encrypted using the DH " -"session key and\n" +"48 bytes AES encrypted using the DH session key and\n" " the last 16 bytes of Y as the IV" msgstr "" @@ -14647,8 +12654,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:332 msgid "" -"This contains Alice's router identity, and a signature of the critical " -"data. Alice sends Bob:" +"This contains Alice's router identity, and a signature of the critical data." +" Alice sends Bob:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:366 @@ -14668,17 +12675,14 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Bob's `RouterIdentity`, tsA, tsB.\n" -" Alice signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in her `RouterIdentity`" +" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:395 #, python-format msgid "" -"448 bytes AES encrypted using the DH" -" session key and\n" -" the last 16 bytes of HXxorHI (i.e., the last 16 bytes " -"of message #1) as the IV" +"448 bytes AES encrypted using the DH session key and\n" +" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:406 @@ -14693,8 +12697,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:412 msgid "" -"Alice will use the last 16 bytes of the encrypted contents of this " -"message as the IV for the next message." +"Alice will use the last 16 bytes of the encrypted contents of this message " +"as the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:436 @@ -14709,19 +12713,15 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Alice's `RouterIdentity`, tsA, tsB.\n" -" Bob signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in his `RouterIdentity`" +" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:485 #, python-format msgid "" -"Data AES encrypted using the DH " -"session key and\n" -" the last 16 bytes of the encrypted contents of message " -"#2 as the IV\n" -" 48 bytes for a DSA signature, may vary for other " -"signature types" +"Data AES encrypted using the DH session key and\n" +" the last 16 bytes of the encrypted contents of message #2 as the IV\n" +" 48 bytes for a DSA signature, may vary for other signature types" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:494 @@ -14730,8 +12730,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:497 msgid "" -"Bob will use the last 16 bytes of the encrypted contents of this message " -"as the IV for the next message." +"Bob will use the last 16 bytes of the encrypted contents of this message as " +"the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:512 @@ -14740,14 +12740,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:513 msgid "" -"The connection is established, and standard or time sync messages may be " -"exchanged.\n" -"All subsequent messages are AES encrypted using the negotiated DH session" -" key.\n" -"Alice will use the last 16 bytes of the encrypted contents of message #3 " -"as the next IV.\n" -"Bob will use the last 16 bytes of the encrypted contents of message #4 as" -" the next IV." +"The connection is established, and standard or time sync messages may be exchanged.\n" +"All subsequent messages are AES encrypted using the negotiated DH session key.\n" +"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n" +"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:522 @@ -14774,8 +12770,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:534 msgid "" -"that many bytes making up the local router's IP address (as reached by " -"the remote side)" +"that many bytes making up the local router's IP address (as reached by the " +"remote side)" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:535 @@ -14794,8 +12790,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:538 msgid "" -"xor of the local router's identity hash and the SHA256 of bytes 32 " -"through bytes 223" +"xor of the local router's identity hash and the SHA256 of bytes 32 through " +"bytes 223" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:541 @@ -14818,11 +12814,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:556 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then.\n" -"However, there is currently no provision for padding beyond the next " -"16-byte boundary,\n" +"However, there is currently no provision for padding beyond the next 16-byte boundary,\n" "to create a limited number of message sizes." msgstr "" @@ -14845,10 +12839,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:7 #, python-format msgid "" -"SSU (also called \"UDP\" in much of the I2P documentation and user " -"interfaces)\n" -"is one of two transports currently " -"implemented in I2P.\n" +"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n" +"is one of two transports currently implemented in I2P.\n" "The other is NTCP2.\n" "Support for NTCP has been removed." msgstr "" @@ -14856,17 +12848,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:14 msgid "" "SSU was introduced in I2P release 0.6.\n" -"In a standard I2P installation, the router uses both NTCP and SSU for " -"outbound connections.\n" +"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n" "SSU-over-IPv6 is supported as of version 0.9.8." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:20 msgid "" -"SSU is called \"semireliable\" because it will repeatedly retransmit " -"unacknowledged messages,\n" -"but only up to a maximum number of times. After that, the message is " -"dropped." +"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n" +"but only up to a maximum number of times. After that, the message is dropped." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:25 @@ -14875,10 +12864,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:27 msgid "" -"Like the NTCP transport, SSU provides reliable, encrypted, connection-" -"oriented, point-to-point data transport.\n" -"Unique to SSU, it also provides IP detection and NAT traversal services, " -"including:" +"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n" +"Unique to SSU, it also provides IP detection and NAT traversal services, including:" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:33 @@ -14895,8 +12882,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:35 msgid "" -"Communication of firewall status and local IP, and changes to either to " -"NTCP" +"Communication of firewall status and local IP, and changes to either to NTCP" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:47 @@ -14931,26 +12917,20 @@ msgid "" "Packets are scheduled according to the router's policy, taking care\n" "not to exceed the router's outbound capacity or to exceed the measured \n" "capacity of the remote peer. The measured capacity operates along the\n" -"lines of TCP's slow start and congestion avoidance, with additive " -"increases\n" -"to the sending capacity and multiplicative decreases in face of " -"congestion.\n" +"lines of TCP's slow start and congestion avoidance, with additive increases\n" +"to the sending capacity and multiplicative decreases in face of congestion.\n" "Unlike for TCP, routers may give up on some messages after\n" -"a given period or number of retransmissions while continuing to transmit" -" \n" +"a given period or number of retransmissions while continuing to transmit \n" "other messages." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:107 msgid "" "The congestion detection techniques vary from TCP as well, since each \n" -"message has its own unique and nonsequential identifier, and each message" -"\n" -"has a limited size - at most, 32KB. To efficiently transmit this " -"feedback\n" +"message has its own unique and nonsequential identifier, and each message\n" +"has a limited size - at most, 32KB. To efficiently transmit this feedback\n" "to the sender, the receiver periodically includes a list of fully ACKed \n" -"message identifiers and may also include bitfields for partially received" -"\n" +"message identifiers and may also include bitfields for partially received\n" "messages, where each bit represents the reception of a fragment. If \n" "duplicate fragments arrive, the message should be ACKed again, or if the\n" "message has still not been fully received, the bitfield should be \n" @@ -14960,8 +12940,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:119 msgid "" "The current implementation does not pad the packets to\n" -"any particular size, but instead just places a single message fragment " -"into\n" +"any particular size, but instead just places a single message fragment into\n" "a packet and sends it off (careful not to exceed the MTU)." msgstr "" @@ -14969,8 +12948,7 @@ msgstr "" msgid "" "As of router version 0.8.12,\n" "two MTU values are used for IPv4: 620 and 1484.\n" -"The MTU value is adjusted based on the percentage of packets that are " -"retransmitted." +"The MTU value is adjusted based on the percentage of packets that are retransmitted." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:132 @@ -14989,10 +12967,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:144 msgid "" -"Based on measurements, 1492 fits nearly all reasonably small I2NP " -"messages\n" -"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going " -"to fit\n" +"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n" +"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n" "into a live network MTU anyway)." msgstr "" @@ -15012,8 +12988,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:162 msgid "" -"As of release 0.9.2, if a router's network interface MTU is less than " -"1484,\n" +"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n" "it will publish that in the network database, and other routers should\n" "honor that when a connection is established." msgstr "" @@ -15033,13 +13008,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:176 msgid "" "While the maximum message size is nominally 32KB, the practical\n" -"limit differs. The protocol limits the number of fragments to 7 bits, or " -"128.\n" -"The current implementation, however, limits each message to a maximum of " -"64 fragments,\n" +"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n" +"The current implementation, however, limits each message to a maximum of 64 fragments,\n" "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n" -"Due to overhead for bundled LeaseSets and session keys, the practical " -"limit\n" +"Due to overhead for bundled LeaseSets and session keys, the practical limit\n" "at the application level is about 6KB lower, or about 26KB.\n" "Further work is necessary to raise the UDP transport limit above 32KB.\n" "For connections using the larger MTU, larger messages are possible." @@ -15053,8 +13025,7 @@ msgstr "المفاتيح" msgid "" "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n" "When Alice originates a session with Bob,\n" -"the MAC and session keys are negotiated as part of the DH exchange, and " -"are then used\n" +"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n" "for the HMAC and encryption, respectively. During the DH exchange, \n" "Bob's publicly knowable introKey is used for the MAC and encryption." msgstr "" @@ -15071,8 +13042,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:217 msgid "" -"Upon receiving a message, the receiver checks the \"from\" IP address and" -" port\n" +"Upon receiving a message, the receiver checks the \"from\" IP address and port\n" "with all established sessions - if there are matches,\n" "that session's MAC keys are tested in the HMAC. If none\n" "of those verify or if there are no matching IP addresses, the \n" @@ -15162,8 +13132,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:297 msgid "" -"Direct session establishment is used when no third party is required for " -"NAT traversal.\n" +"Direct session establishment is used when no third party is required for NAT traversal.\n" "The message sequence is as follows:" msgstr "" @@ -15183,10 +13152,8 @@ msgid "" "After the SessionConfirmed message is received, Bob sends a small\n" "DeliveryStatus message\n" "as a confirmation.\n" -"In this message, the 4-byte message ID is set to a random number, and the" -"\n" -"8-byte \"arrival time\" is set to the current network-wide ID, which is 2" -"\n" +"In this message, the 4-byte message ID is set to a random number, and the\n" +"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n" "(i.e. 0x0000000000000002)." msgstr "" @@ -15202,8 +13169,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:336 msgid "" -"It does not appear that the type of the status message or its contents " -"matters.\n" +"It does not appear that the type of the status message or its contents matters.\n" "It was originally added becasue the DatabaseStore message was delayed\n" "several seconds; since the store is now sent immediately, perhaps\n" "the status message can be eliminated." @@ -15213,8 +13179,7 @@ msgstr "" msgid "" "Introduction keys are delivered through an external channel \n" "(the network database),\n" -"where they have traditionally been identical to the router Hash through " -"release 0.9.47,\n" +"where they have traditionally been identical to the router Hash through release 0.9.47,\n" "but may be random as of release 0.9.48.\n" "They must be used when establishing a session key. For the indirect\n" "address, the peer must first contact the relayhost and ask them for\n" @@ -15233,24 +13198,16 @@ msgid "" "is necessary for efficient NAT traversal. Charlie, a router behind a\n" "NAT or firewall which does not allow unsolicited inbound UDP packets,\n" "first contacts a few peers, choosing some to serve as introducers. Each\n" -"of these peers (Bob, Bill, Betty, etc) provide Charlie with an " -"introduction\n" -"tag - a 4 byte random number - which he then makes available to the " -"public\n" -"as methods of contacting him. Alice, a router who has Charlie's " -"published\n" -"contact methods, first sends a RelayRequest packet to one or more of the" -" \n" +"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n" +"tag - a 4 byte random number - which he then makes available to the public\n" +"as methods of contacting him. Alice, a router who has Charlie's published\n" +"contact methods, first sends a RelayRequest packet to one or more of the \n" "introducers, asking each to introduce her to Charlie (offering the \n" "introduction tag to identify Charlie). Bob then forwards a RelayIntro\n" -"packet to Charlie including Alice's public IP and port number, then sends" -"\n" -"Alice back a RelayResponse packet containing Charlie's public IP and port" -"\n" -"number. When Charlie receives the RelayIntro packet, he sends off a " -"small\n" -"random packet to Alice's IP and port (poking a hole in his NAT/firewall)," -"\n" +"packet to Charlie including Alice's public IP and port number, then sends\n" +"Alice back a RelayResponse packet containing Charlie's public IP and port\n" +"number. When Charlie receives the RelayIntro packet, he sends off a small\n" +"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n" "and when Alice receives Bob's RelayResponse packet, she begins a new \n" "full direction session establishment with the specified IP and port." msgstr "" @@ -15260,13 +13217,14 @@ msgid "Connection establishment (indirect using an introducer)" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:390 -msgid "Alice first connects to introducer Bob, who relays the request to Charlie." +msgid "" +"Alice first connects to introducer Bob, who relays the request to Charlie." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:408 msgid "" -"After the hole punch, the session is established between Alice and " -"Charlie as in a direct establishment." +"After the hole punch, the session is established between Alice and Charlie " +"as in a direct establishment." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:428 @@ -15347,12 +13305,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:507 msgid "" "Alice's introduction key is included in all of the PeerTest messages\n" -"so that Charlie can contact her without knowing any additional " -"information.\n" +"so that Charlie can contact her without knowing any additional information.\n" "As of release 0.9.15, Alice must have an established\n" "session with Bob, to prevent spoofing attacks.\n" -"Alice must not have an established session with Charlie for the peer test" -"\n" +"Alice must not have an established session with Charlie for the peer test\n" "to be valid.\n" "Alice may go on to establish a session\n" "with Charlie, but it is not required." @@ -15375,14 +13331,12 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:555 #, python-format msgid "" -"The details of windowing, ACK, and retransmission strategies are not " -"specified\n" +"The details of windowing, ACK, and retransmission strategies are not specified\n" "here. See the Java code for the current implementation.\n" "During the establishment phase, and for peer testing, routers\n" "should implement exponential backoff for retransmission.\n" "For an established connection, routers should implement\n" -"an adjustable transmission window, RTT estimate and timeout, similar to " -"TCP\n" +"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n" "or streaming.\n" "See the code for initial, min and max parameters." msgstr "" @@ -15419,27 +13373,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:630 msgid "" -"Analysis of current SSU performance, including assessment of window size " -"adjustment\n" -"and other parameters, and adjustment of the protocol implementation to " -"improve\n" +"Analysis of current SSU performance, including assessment of window size adjustment\n" +"and other parameters, and adjustment of the protocol implementation to improve\n" "performance, is a topic for future work." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:636 msgid "" -"The current implementation repeatedly sends acknowledgments for the same " -"packets,\n" +"The current implementation repeatedly sends acknowledgments for the same packets,\n" "which unnecessarily increases overhead." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:641 msgid "" -"The default small MTU value of 620 should be analyzed and possibly " -"increased.\n" +"The default small MTU value of 620 should be analyzed and possibly increased.\n" "The current MTU adjustment strategy should be evaluated.\n" -"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? " -"Probably not." +"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:647 @@ -15452,24 +13401,21 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:655 msgid "" -"The potential use of the 'challenge' fields in RelayIntro and " -"RelayResponse,\n" -"and use of the padding field in SessionRequest and SessionCreated, is " -"undocumented." +"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n" +"and use of the padding field in SessionRequest and SessionCreated, is undocumented." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:660 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:666 msgid "" -"Signed-on times in SessionCreated and SessionConfirmed appear to be " -"unused or unverified." +"Signed-on times in SessionCreated and SessionConfirmed appear to be unused " +"or unverified." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:671 @@ -15479,8 +13425,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:672 msgid "" "This diagram\n" -"should accurately reflect the current implementation, however there may " -"be small differences." +"should accurately reflect the current implementation, however there may be small differences." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:680 @@ -15504,12 +13449,9 @@ msgid "" "Within I2P, messages are passed in one direction through a virtual\n" "tunnel of peers, using whatever means are available to pass the \n" "message on to the next hop. Messages arrive at the tunnel's \n" -"gateway, get bundled up and/or fragmented into fixed-size tunnel " -"messages, \n" -"and are forwarded on to the next hop in the tunnel, which processes and " -"verifies\n" -"the validity of the message and sends it on to the next hop, and so on, " -"until\n" +"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n" +"and are forwarded on to the next hop in the tunnel, which processes and verifies\n" +"the validity of the message and sends it on to the next hop, and so on, until\n" "it reaches the tunnel endpoint. That endpoint takes the messages\n" "bundled up by the gateway and forwards them as instructed - either\n" "to another router, to another tunnel on another router, or locally." @@ -15531,12 +13473,9 @@ msgid "" "in the tunnel, and provides each with the necessary configuration\n" "data. They may have any number of hops.\n" "It is the intent to make\n" -"it hard for either participants or third parties to determine the length " -"of \n" -"a tunnel, or even for colluding participants to determine whether they " -"are a\n" -"part of the same tunnel at all (barring the situation where colluding " -"peers are\n" +"it hard for either participants or third parties to determine the length of \n" +"a tunnel, or even for colluding participants to determine whether they are a\n" +"part of the same tunnel at all (barring the situation where colluding peers are\n" "next to each other in the tunnel)." msgstr "" @@ -15574,8 +13513,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:69 #, python-format msgid "" -"After a tunnel is built, I2NP messages are " -"processed and passed through it.\n" +"After a tunnel is built, I2NP messages are processed and passed through it.\n" "Tunnel operation has four distinct processes, taken on by various \n" "peers in the tunnel." msgstr "" @@ -15602,8 +13540,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:89 msgid "" -"Eventually, the tunnel messages arrive at the endpoint where the I2NP " -"messages\n" +"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n" "originally bundled by the gateway are reassembled and forwarded on as \n" "requested." msgstr "" @@ -15663,11 +13600,13 @@ msgid "Decrypt (using an encryption operation)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:133 -msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message" +msgid "" +"Decrypt (using an encryption operation) to reveal plaintext tunnel message" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:134 -msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" +msgid "" +"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:142 @@ -15728,10 +13667,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:181 msgid "" "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n" -"tunnel ID to listen for messages with and what tunnel ID they should be " -"forwarded\n" -"on as to the next hop, and each hop chooses the tunnel ID which they " -"receive messages\n" +"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n" +"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n" "on. Tunnels themselves are short-lived (10 minutes).\n" "Even if subsequent tunnels are built using the same sequence of \n" "peers, each hop's tunnel ID will change." @@ -15739,16 +13676,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:190 msgid "" -"To prevent adversaries from tagging the messages along the path by " -"adjusting\n" -"the message size, all tunnel messages are a fixed 1024 bytes in size. To" -" accommodate \n" -"larger I2NP messages as well as to support smaller ones more efficiently," -" the\n" -"gateway splits up the larger I2NP messages into fragments contained " -"within each\n" -"tunnel message. The endpoint will attempt to rebuild the I2NP message " -"from the\n" +"To prevent adversaries from tagging the messages along the path by adjusting\n" +"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n" +"larger I2NP messages as well as to support smaller ones more efficiently, the\n" +"gateway splits up the larger I2NP messages into fragments contained within each\n" +"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n" "fragments for a short period of time, but will discard them as necessary." msgstr "" @@ -15765,30 +13697,20 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:207 msgid "" -"After the preprocessing of messages into a padded payload, the gateway " -"builds\n" -"a random 16 byte IV value, iteratively encrypting it and the tunnel " -"message as\n" -"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel " -"message} to the next hop." +"After the preprocessing of messages into a padded payload, the gateway builds\n" +"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n" +"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:213 msgid "" -"How encryption at the gateway is done depends on whether the tunnel is an" -"\n" -"inbound or an outbound tunnel. For inbound tunnels, they simply select a" -" random\n" -"IV, postprocessing and updating it to generate the IV for the gateway and" -" using \n" -"that IV along side their own layer key to encrypt the preprocessed data." -" For outbound \n" -"tunnels they must iteratively decrypt the (unencrypted) IV and " -"preprocessed \n" -"data with the IV and layer keys for all hops in the tunnel. The result " -"of the outbound\n" -"tunnel encryption is that when each peer encrypts it, the endpoint will " -"recover \n" +"How encryption at the gateway is done depends on whether the tunnel is an\n" +"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n" +"IV, postprocessing and updating it to generate the IV for the gateway and using \n" +"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n" +"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n" +"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n" +"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n" "the initial preprocessed data." msgstr "" @@ -15798,46 +13720,29 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:227 msgid "" -"When a peer receives a tunnel message, it checks that the message came " -"from\n" -"the same previous hop as before (initialized when the first message comes" -" through\n" -"the tunnel). If the previous peer is a different router, or if the " -"message has\n" -"already been seen, the message is dropped. The participant then encrypts" -" the \n" -"received IV with AES256/ECB using their IV key to determine the current " -"IV, uses \n" -"that IV with the participant's layer key to encrypt the data, encrypts " -"the \n" -"current IV with AES256/ECB using their IV key again, then forwards the " -"tuple \n" -"{nextTunnelId, nextIV, encryptedData} to the next hop. This double " -"encryption\n" +"When a peer receives a tunnel message, it checks that the message came from\n" +"the same previous hop as before (initialized when the first message comes through\n" +"the tunnel). If the previous peer is a different router, or if the message has\n" +"already been seen, the message is dropped. The participant then encrypts the \n" +"received IV with AES256/ECB using their IV key to determine the current IV, uses \n" +"that IV with the participant's layer key to encrypt the data, encrypts the \n" +"current IV with AES256/ECB using their IV key again, then forwards the tuple \n" +"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n" "of the IV (both before and after use) help address a certain class of\n" "confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:243 msgid "" -"Duplicate message detection is handled by a decaying Bloom filter on " -"message\n" -"IVs. Each router maintains a single Bloom filter to contain the XOR of " -"the IV and\n" -"the first block of the message received for all of the tunnels it is " -"participating\n" -"in, modified to drop seen entries after 10-20 minutes (when the tunnels " -"will have\n" -"expired). The size of the bloom filter and the parameters used are " -"sufficient to\n" -"more than saturate the router's network connection with a negligible " -"chance of \n" -"false positive. The unique value fed into the Bloom filter is the XOR of" -" the IV \n" -"and the first block so as to prevent nonsequential colluding peers in the" -" tunnel \n" -"from tagging a message by resending it with the IV and first block " -"switched." +"Duplicate message detection is handled by a decaying Bloom filter on message\n" +"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n" +"the first block of the message received for all of the tunnels it is participating\n" +"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n" +"expired). The size of the bloom filter and the parameters used are sufficient to\n" +"more than saturate the router's network connection with a negligible chance of \n" +"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n" +"and the first block so as to prevent nonsequential colluding peers in the tunnel \n" +"from tagging a message by resending it with the IV and first block switched." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:256 @@ -15846,27 +13751,19 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:258 msgid "" -"After receiving and validating a tunnel message at the last hop in the " -"tunnel,\n" -"how the endpoint recovers the data encoded by the gateway depends upon " -"whether \n" -"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, " -"the \n" -"endpoint encrypts the message with its layer key just like any other " -"participant, \n" -"exposing the preprocessed data. For inbound tunnels, the endpoint is " -"also the \n" -"tunnel creator so they can merely iteratively decrypt the IV and message," -" using the \n" +"After receiving and validating a tunnel message at the last hop in the tunnel,\n" +"how the endpoint recovers the data encoded by the gateway depends upon whether \n" +"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n" +"endpoint encrypts the message with its layer key just like any other participant, \n" +"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n" +"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n" "layer and IV keys of each step in reverse order." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:268 msgid "" -"At this point, the tunnel endpoint has the preprocessed data sent by the " -"gateway,\n" -"which it may then parse out into the included I2NP messages and forwards " -"them as\n" +"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n" +"which it may then parse out into the included I2NP messages and forwards them as\n" "requested in their delivery instructions." msgstr "" @@ -15876,30 +13773,21 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:277 msgid "" -"When building a tunnel, the creator must send a request with the " -"necessary\n" -"configuration data to each of the hops and wait for all of them to agree " -"before\n" -"enabling the tunnel. The requests are encrypted so that only the peers " -"who need\n" -"to know a piece of information (such as the tunnel layer or IV key) has " -"that\n" -"data. In addition, only the tunnel creator will have access to the " -"peer's\n" -"reply. There are three important dimensions to keep in mind when " -"producing\n" -"the tunnels: what peers are used (and where), how the requests are sent " -"(and \n" +"When building a tunnel, the creator must send a request with the necessary\n" +"configuration data to each of the hops and wait for all of them to agree before\n" +"enabling the tunnel. The requests are encrypted so that only the peers who need\n" +"to know a piece of information (such as the tunnel layer or IV key) has that\n" +"data. In addition, only the tunnel creator will have access to the peer's\n" +"reply. There are three important dimensions to keep in mind when producing\n" +"the tunnels: what peers are used (and where), how the requests are sent (and \n" "replies received), and how they are maintained." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:291 msgid "" -"Beyond the two types of tunnels - inbound and outbound - there are two " -"styles\n" +"Beyond the two types of tunnels - inbound and outbound - there are two styles\n" "of peer selection used for different tunnels - exploratory and client.\n" -"Exploratory tunnels are used for both network database maintenance and " -"tunnel\n" +"Exploratory tunnels are used for both network database maintenance and tunnel\n" "maintenance, while client tunnels are used for end to end client messages." msgstr "" @@ -15909,18 +13797,12 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:301 msgid "" -"Exploratory tunnels are built out of a random selection of peers from a " -"subset\n" -"of the network. The particular subset varies on the local router and on " -"what their\n" -"tunnel routing needs are. In general, the exploratory tunnels are built " -"out of\n" -"randomly selected peers who are in the peer's \"not failing but active\" " -"profile\n" -"category. The secondary purpose of the tunnels, beyond merely tunnel " -"routing,\n" -"is to find underutilized high capacity peers so that they can be promoted" -" for\n" +"Exploratory tunnels are built out of a random selection of peers from a subset\n" +"of the network. The particular subset varies on the local router and on what their\n" +"tunnel routing needs are. In general, the exploratory tunnels are built out of\n" +"randomly selected peers who are in the peer's \"not failing but active\" profile\n" +"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n" +"is to find underutilized high capacity peers so that they can be promoted for\n" "use in client tunnels." msgstr "" @@ -15937,14 +13819,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:319 msgid "" -"Client tunnels are built with a more stringent set of requirements - the " -"local\n" -"router will select peers out of its \"fast and high capacity\" profile " -"category so\n" -"that performance and reliability will meet the needs of the client " -"application.\n" -"However, there are several important details beyond that basic selection " -"that \n" +"Client tunnels are built with a more stringent set of requirements - the local\n" +"router will select peers out of its \"fast and high capacity\" profile category so\n" +"that performance and reliability will meet the needs of the client application.\n" +"However, there are several important details beyond that basic selection that \n" "should be adhered to, depending upon the client's anonymity needs." msgstr "" @@ -15970,10 +13848,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:341 msgid "" "To frustrate the predecessor \n" -"attack, the tunnel selection keeps the peers selected in a strict order -" -"\n" -"if A, B, and C are in a tunnel for a particular tunnel pool, the hop " -"after A is always B, and the hop after\n" +"attack, the tunnel selection keeps the peers selected in a strict order -\n" +"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n" "B is always C." msgstr "" @@ -15982,18 +13858,15 @@ msgid "" "Ordering is implemented by generating a random 32-byte key for each\n" "tunnel pool at startup.\n" "Peers should not be able to guess the ordering, or an attacker could\n" -"craft two router hashes far apart to maximize the chance of being at both" -"\n" +"craft two router hashes far apart to maximize the chance of being at both\n" "ends of a tunnel.\n" "Peers are sorted by XOR distance of the\n" -"SHA256 Hash of (the peer's hash concatenated with the random key) from " -"the random key" +"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:363 msgid "" -"Because each tunnel pool uses a different random key, ordering is " -"consistent\n" +"Because each tunnel pool uses a different random key, ordering is consistent\n" "within a single pool but not between different pools.\n" "New keys are generated at each router restart." msgstr "" @@ -16005,8 +13878,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:372 #, python-format msgid "" -"A multi-hop tunnel is built using a single build message which is " -"repeatedly\n" +"A multi-hop tunnel is built using a single build message which is repeatedly\n" "decrypted and forwarded. In the terminology of\n" "Hashing it out in Public,\n" "this is \"non-interactive\" telescopic tunnel building." @@ -16017,38 +13889,28 @@ msgstr "" msgid "" "This tunnel request preparation, delivery, and response method is\n" "designed to reduce the number of\n" -"predecessors exposed, cuts the number of messages transmitted, verifies " -"proper\n" -"connectivity, and avoids the message counting attack of traditional " -"telescopic\n" +"predecessors exposed, cuts the number of messages transmitted, verifies proper\n" +"connectivity, and avoids the message counting attack of traditional telescopic\n" "tunnel creation.\n" -"(This method, which sends messages to extend a tunnel through the " -"already-established\n" -"part of the tunnel, is termed \"interactive\" telescopic tunnel building " -"in\n" +"(This method, which sends messages to extend a tunnel through the already-established\n" +"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n" "the \"Hashing it out\" paper.)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:390 #, python-format msgid "" -"The details of tunnel request and response messages, and their " -"encryption,\n" +"The details of tunnel request and response messages, and their encryption,\n" "are specified here." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:395 msgid "" -"Peers may reject tunnel creation requests for a variety of reasons, " -"though\n" -"a series of four increasingly severe rejections are known: probabilistic " -"rejection\n" -"(due to approaching the router's capacity, or in response to a flood of " -"requests), \n" -"transient overload, bandwidth overload, and critical failure. When " -"received, \n" -"those four are interpreted by the tunnel creator to help adjust their " -"profile of\n" +"Peers may reject tunnel creation requests for a variety of reasons, though\n" +"a series of four increasingly severe rejections are known: probabilistic rejection\n" +"(due to approaching the router's capacity, or in response to a flood of requests), \n" +"transient overload, bandwidth overload, and critical failure. When received, \n" +"those four are interpreted by the tunnel creator to help adjust their profile of\n" "the router in question." msgstr "" @@ -16066,37 +13928,26 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:412 #, python-format msgid "" -"To allow efficient operation, the router maintains a series of tunnel " -"pools,\n" -"each managing a group of tunnels used for a specific purpose with their " -"own\n" -"configuration. When a tunnel is needed for that purpose, the router " -"selects one\n" -"out of the appropriate pool at random. Overall, there are two " -"exploratory tunnel\n" -"pools - one inbound and one outbound - each using the router's default " -"configuration.\n" +"To allow efficient operation, the router maintains a series of tunnel pools,\n" +"each managing a group of tunnels used for a specific purpose with their own\n" +"configuration. When a tunnel is needed for that purpose, the router selects one\n" +"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n" +"pools - one inbound and one outbound - each using the router's default configuration.\n" "In addition, there is a pair of pools for each local destination -\n" -"one inbound and one outbound tunnel pool. Those pools use the " -"configuration specified\n" -"when the local destination connects to the router via I2CP, or the router's defaults if\n" +"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n" +"when the local destination connects to the router via I2CP, or the router's defaults if\n" "not specified." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:424 #, python-format msgid "" -"Each pool has within its configuration a few key settings, defining how " -"many\n" -"tunnels to keep active, how many backup tunnels to maintain in case of " -"failure,\n" +"Each pool has within its configuration a few key settings, defining how many\n" +"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n" "how long the tunnels should be, whether those\n" "lengths should be randomized, as \n" -"well as any of the other settings allowed when configuring individual " -"tunnels.\n" -"Configuration options are specified on the I2CP " -"page." +"well as any of the other settings allowed when configuring individual tunnels.\n" +"Configuration options are specified on the I2CP page." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:434 @@ -16113,20 +13964,14 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:440 msgid "" -"Tunnel building is expensive, and tunnels expire a fixed time after they " -"are built.\n" -"However, when a pool that runs out of tunnels, the Destination is " -"essentially dead.\n" -"In addition, tunnel build success rate may vary greatly with both local " -"and global\n" +"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n" +"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n" +"In addition, tunnel build success rate may vary greatly with both local and global\n" "network conditions.\n" -"Therefore, it is important to maintain an anticipatory, adaptive build " -"strategy\n" -"to ensure that new tunnels are successfully built before they are needed," -"\n" +"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n" +"to ensure that new tunnels are successfully built before they are needed,\n" "without building an excess of tunnels, building them too soon,\n" -"or consuming too much CPU or bandwidth creating and sending the encrypted" -" build messages." +"or consuming too much CPU or bandwidth creating and sending the encrypted build messages." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:451 @@ -16134,8 +13979,7 @@ msgid "" "For each tuple {exploratory/client, in/out, length, length variance}\n" "the router maintains statistics on the time required for a successful\n" "tunnel build.\n" -"Using these statistics, it calculates how long before a tunnel's " -"expiration\n" +"Using these statistics, it calculates how long before a tunnel's expiration\n" "it should start attempting to build a replacement.\n" "As the expiration time approaches without a successful replacement,\n" "it starts multiple build attempts in parallel, and then\n" @@ -16157,30 +14001,18 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:473 msgid "" -"Even though the tunnels within I2P bear a resemblance to a circuit " -"switched\n" -"network, everything within I2P is strictly message based - tunnels are " -"merely\n" -"accounting tricks to help organize the delivery of messages. No " -"assumptions are\n" -"made regarding reliability or ordering of messages, and retransmissions " -"are left\n" -"to higher levels (e.g. I2P's client layer streaming library). This " -"allows I2P\n" -"to take advantage of throttling techniques available to both packet " -"switched and\n" -"circuit switched networks. For instance, each router may keep track of " -"the \n" -"moving average of how much data each tunnel is using, combine that with " -"all of \n" -"the averages used by other tunnels the router is participating in, and be" -" able\n" -"to accept or reject additional tunnel participation requests based on its" -" \n" -"capacity and utilization. On the other hand, each router can simply drop" -" \n" -"messages that are beyond its capacity, exploiting the research used on " -"the \n" +"Even though the tunnels within I2P bear a resemblance to a circuit switched\n" +"network, everything within I2P is strictly message based - tunnels are merely\n" +"accounting tricks to help organize the delivery of messages. No assumptions are\n" +"made regarding reliability or ordering of messages, and retransmissions are left\n" +"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n" +"to take advantage of throttling techniques available to both packet switched and\n" +"circuit switched networks. For instance, each router may keep track of the \n" +"moving average of how much data each tunnel is using, combine that with all of \n" +"the averages used by other tunnels the router is participating in, and be able\n" +"to accept or reject additional tunnel participation requests based on its \n" +"capacity and utilization. On the other hand, each router can simply drop \n" +"messages that are beyond its capacity, exploiting the research used on the \n" "normal Internet." msgstr "" @@ -16188,23 +14020,16 @@ msgstr "" msgid "" "In the current implementation, routers implement a\n" "weighted random early discard (WRED) strategy.\n" -"For all participating routers (internal participant, inbound gateway, and" -" outbound endpoint),\n" +"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n" "the router will start randomly dropping a portion of messages as the\n" "bandwidth limits are approached.\n" -"As traffic gets closer to, or exceeds, the limits, more messages are " -"dropped.\n" -"For an internal participant, all messages are fragmented and padded and " -"therefore are the same size.\n" -"At the inbound gateway and outbound endpoint, however, the dropping " -"decision is made\n" -"on the full (coalesced) message, and the message size is taken into " -"account.\n" +"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n" +"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n" +"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n" +"on the full (coalesced) message, and the message size is taken into account.\n" "Larger messages are more likely to be dropped.\n" -"Also, messages are more likely to be dropped at the outbound endpoint " -"than the inbound gateway,\n" -"as those messages are not as \"far along\" in their journey and thus the " -"network cost of\n" +"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n" +"as those messages are not as \"far along\" in their journey and thus the network cost of\n" "dropping those messages is lower." msgstr "" @@ -16214,16 +14039,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:509 msgid "" -"What strategies could be used at the gateway and at each hop for " -"delaying,\n" -"reordering, rerouting, or padding messages? To what extent should this " -"be done\n" -"automatically, how much should be configured as a per tunnel or per hop " -"setting,\n" -"and how should the tunnel's creator (and in turn, user) control this " -"operation?\n" -"All of this is left as unknown, to be worked out for a distant future " -"release." +"What strategies could be used at the gateway and at each hop for delaying,\n" +"reordering, rerouting, or padding messages? To what extent should this be done\n" +"automatically, how much should be configured as a per tunnel or per hop setting,\n" +"and how should the tunnel's creator (and in turn, user) control this operation?\n" +"All of this is left as unknown, to be worked out for a distant future release." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:518 @@ -16232,13 +14052,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:519 msgid "" -"The padding strategies can be used on a variety of levels, addressing the" -"\n" +"The padding strategies can be used on a variety of levels, addressing the\n" "exposure of message size information to different adversaries.\n" -"The current fixed tunnel message size is 1024 bytes. Within this " -"however, the fragmented\n" -"messages themselves are not padded by the tunnel at all, though for end " -"to end \n" +"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n" +"messages themselves are not padded by the tunnel at all, though for end to end \n" "messages, they may be padded as part of the garlic wrapping." msgstr "" @@ -16266,8 +14083,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7 msgid "" -"This page describes the origins and design of I2P's unidirectional " -"tunnels.\n" +"This page describes the origins and design of I2P's unidirectional tunnels.\n" "For further information see:" msgstr "" @@ -16301,8 +14117,7 @@ msgid "" "Several apps and protocols, notably HTTP,\n" "do transfer data in such manner. Having the traffic follow the same \n" "route to its destination and back could make it easier for an \n" -"attacker who has only timing and traffic volume data to infer the path a" -" \n" +"attacker who has only timing and traffic volume data to infer the path a \n" "tunnel is taking.\n" "Having the response come back along a different path arguably \n" "makes it harder." @@ -16311,42 +14126,27 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45 msgid "" "When dealing with \n" -"an internal adversary or most external adversaries, I2P's undirectional " -"tunnels\n" -"expose half as much traffic data than would be exposed with bidirectional" -" circuits\n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels." +"an internal adversary or most external adversaries, I2P's undirectional tunnels\n" +"expose half as much traffic data than would be exposed with bidirectional circuits\n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55 msgid "" "The strategy of using two separate tunnels for inbound and outbound\n" -"communication is not the only technique available, and it does have " -"anonymity\n" -"implications. On the positive side, by using separate tunnels it lessens" -" the\n" -"traffic data exposed for analysis to participants in a tunnel - for " -"instance,\n" -"peers in an outbound tunnel from a web browser would only see the traffic" -" of\n" +"communication is not the only technique available, and it does have anonymity\n" +"implications. On the positive side, by using separate tunnels it lessens the\n" +"traffic data exposed for analysis to participants in a tunnel - for instance,\n" +"peers in an outbound tunnel from a web browser would only see the traffic of\n" "an HTTP GET, while the peers in an inbound tunnel would see the payload \n" -"delivered along the tunnel. With bidirectional tunnels, all participants" -" would\n" -"have access to the fact that e.g. 1KB was sent in one direction, then " -"100KB\n" -"in the other. On the negative side, using unidirectional tunnels means " -"that\n" -"there are two sets of peers which need to be profiled and accounted for, " -"and\n" -"additional care must be taken to address the increased speed of " -"predecessor\n" +"delivered along the tunnel. With bidirectional tunnels, all participants would\n" +"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n" +"in the other. On the negative side, using unidirectional tunnels means that\n" +"there are two sets of peers which need to be profiled and accounted for, and\n" +"additional care must be taken to address the increased speed of predecessor\n" "attacks. The tunnel pooling and building process\n" "(peer selection and ordering strategies)\n" "should minimize the worries of the predecessor attack." @@ -16360,28 +14160,22 @@ msgstr "نعم" #, python-format msgid "" "A recent paper by Hermann and Grothoff\n" -"declared that I2P's unidirectional tunnels \"seems to be a bad design " -"decision\"." +"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80 msgid "" "The paper's main point is that\n" -"deanonymizations on unidirectional tunnels take a longer time, which is " -"an \n" -"advantage, but that an attacker can be more certain in the unidirectional" -" case. \n" -"Therefore, the paper claims it isn't an advantage at all, but a " -"disadvantage, at least\n" +"deanonymizations on unidirectional tunnels take a longer time, which is an \n" +"advantage, but that an attacker can be more certain in the unidirectional case. \n" +"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n" "with long-living I2P Sites." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88 msgid "" -"This conclusion is not fully supported by the paper. Unidirectional " -"tunnels clearly \n" -"mitigate other attacks and it's not clear how to trade off the risk of " -"the \n" +"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n" +"mitigate other attacks and it's not clear how to trade off the risk of the \n" "attack in the paper\n" "with attacks on a bidirectional tunnel architecture." msgstr "" @@ -16390,63 +14184,45 @@ msgstr "" msgid "" "This conclusion is based on an arbitrary certainty vs. time weighting \n" "(tradeoff) that may not be applicable in all cases. For \n" -"example, somebody could make a list of possible IPs then issue subpoenas " -"to \n" +"example, somebody could make a list of possible IPs then issue subpoenas to \n" "each. Or the attacker could DDoS each in turn and via a simple \n" -"intersection attack see if the I2P Site goes down or is slowed down. So " -"close \n" +"intersection attack see if the I2P Site goes down or is slowed down. So close \n" "may be good enough, or time may be more important." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104 msgid "" -"The conclusion is based on a specific weighting of the importance of " -"certainty \n" -"vs. time, and that weighting may be wrong, and it's definitely debatable," -" \n" -"especially in a real world with subpoenas, search warrants, and other " -"methods \n" +"The conclusion is based on a specific weighting of the importance of certainty \n" +"vs. time, and that weighting may be wrong, and it's definitely debatable, \n" +"especially in a real world with subpoenas, search warrants, and other methods \n" "available for final confirmation." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111 msgid "" "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n" -"tunnels is clearly outside the scope of the paper, and has not been done" -" \n" -"elsewhere. For example, how does this attack compare to the numerous " -"possible \n" -"timing attacks published about onion-routed networks? Clearly the authors" -" have not\n" +"tunnels is clearly outside the scope of the paper, and has not been done \n" +"elsewhere. For example, how does this attack compare to the numerous possible \n" +"timing attacks published about onion-routed networks? Clearly the authors have not\n" "done that analysis, if it's even possible to do it\n" "effectively." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120 msgid "" -"Tor uses bidirectional tunnels and has had a lot of academic review. I2P" -" \n" -"uses unidirectional tunnels and has had very little review. Does the lack" -" of a \n" -"research paper defending unidirectional tunnels mean that it is a poor " -"design \n" +"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n" +"uses unidirectional tunnels and has had very little review. Does the lack of a \n" +"research paper defending unidirectional tunnels mean that it is a poor design \n" "choice, or just that it needs more study? Timing attacks and \n" -"distributed attacks are difficult to defend against in both I2P and Tor. " -"The \n" -"design intent (see references above) was that unidirectional tunnels are " -"more \n" -"resistant to timing attacks. However, the paper presents a somewhat " -"different type of timing \n" +"distributed attacks are difficult to defend against in both I2P and Tor. The \n" +"design intent (see references above) was that unidirectional tunnels are more \n" +"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n" "attack. Is this attack, innovative as it is, sufficient to label I2P's \n" "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n" -"implication clearly inferior to Tor, or is it just a design alternative " -"that \n" -"clearly needs further investigation and analysis? There are several other" -" reasons \n" -"to consider I2P currently inferior to Tor and other projects (small " -"network \n" -"size, lack of funding, lack of review) but is unidirectional tunnels " -"really a \n" +"implication clearly inferior to Tor, or is it just a design alternative that \n" +"clearly needs further investigation and analysis? There are several other reasons \n" +"to consider I2P currently inferior to Tor and other projects (small network \n" +"size, lack of funding, lack of review) but is unidirectional tunnels really a \n" "reason?" msgstr "" @@ -16457,4 +14233,3 @@ msgid "" "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n" "conclusion is not supported by the paper." msgstr "" - diff --git a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po index 6b1b1c58..a0dc6b1f 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. +# Translations template for I2P. # Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-11-08 21:15+0000\n" "PO-Revision-Date: 2013-07-15 12:00+0000\n" "Last-Translator: FULL NAME \n" "Language-Team: Arabic (http://app.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/get-involved/index.html:1 msgid "Get Involved" @@ -36,13 +36,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 msgid "" -"The project hosts meetings on the first Tuesday of every month that are " -"open to the community. This is a great opportunity to see what is " -"happening with I2P core development and\n" -" familiarize yourself with Roadmap tasks. Additionally, protocol " -"development meetings take place every Tuesday and zzz's development forum" -" is available all of the time as a place to participate in development " -"and issues that need fixing. See the\n" +"The project hosts meetings on the first Tuesday of every month that are open to the community. This is a great opportunity to see what is happening with I2P core development and\n" +" familiarize yourself with Roadmap tasks. Additionally, protocol development meetings take place every Tuesday and zzz's development forum is available all of the time as a place to participate in development and issues that need fixing. See the\n" " new developer's guide for how to get started." msgstr "" @@ -52,12 +47,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:9 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -" Wikipedia article " -"about I2P in your language. Tell your friends, and more importantly, " -"use I2P to communicate with your friends. We have many tools that can " -"help you keep your private conversations\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +" Wikipedia article about I2P in your language. Tell your friends, and more importantly, use I2P to communicate with your friends. We have many tools that can help you keep your private conversations\n" " private." msgstr "" @@ -68,12 +59,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:13 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are a very important\n" -" part of this decentralized project and your work is always " -"appreciated. See the new translator's guide for details. The project also" -" welcomes support to help keep its documentation updated. See the new translator's guide for details." +"Help translate the website and the software into your language. Translators are a very important\n" +" part of this decentralized project and your work is always appreciated. See the new translator's guide for details. The project also welcomes support to help keep its documentation updated. See the new translator's guide for details." msgstr "" #: i2p2www/pages/site/get-involved/index.html:17 @@ -86,12 +73,8 @@ msgstr "الخدمات" #: i2p2www/pages/site/get-involved/index.html:19 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub forum for everyone and anything in between, is helpful to the" -" I2P network,\n" -" especially if you write down instructions for others. Almost " -"anything you can think of can be made to work with I2P, and your service " -"is valuable to the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub forum for everyone and anything in between, is helpful to the I2P network,\n" +" especially if you write down instructions for others. Almost anything you can think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:22 @@ -101,12 +84,8 @@ msgstr "اعادة التوزيع" #: i2p2www/pages/site/get-involved/index.html:22 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed\n" -" servers we have, the more de-centralized and redundant our " -"infrastructure is. It's a big responsibility, but it's pretty easy to set" -" up a reseed server for new routers to bootstrap from. Detailed " -"instructions are on our reseed server page." +"Getting new users onto the network is a very important task, and that task is handled by our reseed servers. The more reseed\n" +" servers we have, the more de-centralized and redundant our infrastructure is. It's a big responsibility, but it's pretty easy to set up a reseed server for new routers to bootstrap from. Detailed instructions are on our reseed server page." msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 @@ -120,8 +99,7 @@ msgstr "التطبيقات" #: i2p2www/pages/site/get-involved/index.html:29 #, python-format msgid "" -"Write or port applications for I2P. There's some guidelines and a list of" -" ideas\n" +"Write or port applications for I2P. There's some guidelines and a list of ideas\n" " on the applications page." msgstr "" @@ -133,11 +111,7 @@ msgstr "" #, python-format msgid "" "There's plenty to do if\n" -" you know Java or are ready to learn. Check for open tickets on Trac or the TODO list on %(zzz)s for some ideas on where to start. See" -" the new developer's guide for " -"details." +" you know Java or are ready to learn. Check for open tickets on Trac or the TODO list on %(zzz)s for some ideas on where to start. See the new developer's guide for details." msgstr "" #: i2p2www/pages/site/get-involved/index.html:35 @@ -147,10 +121,8 @@ msgstr "التحليل" #: i2p2www/pages/site/get-involved/index.html:35 #, python-format msgid "" -"Study or test the code to look for vulnerabilities. Both anonymity " -"vulnerabilities from the various\n" -" threat models, and DOS and other " -"weaknesses due to security holes, benefit from ongoing research." +"Study or test the code to look for vulnerabilities. Both anonymity vulnerabilities from the various\n" +" threat models, and DOS and other weaknesses due to security holes, benefit from ongoing research." msgstr "" #: i2p2www/pages/site/get-involved/index.html:39 @@ -232,84 +204,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also the roadmap. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also the roadmap. Want to help?\n" "Get involved!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a Sybil \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a Sybil \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -318,17 +267,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "Hashcash is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -336,29 +280,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "research \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -366,42 +304,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -445,72 +374,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using I2PTunnel,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in Figure 1." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in Figure 1." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in Figure 2.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -520,8 +429,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -534,33 +443,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard plugins interface for" -" developers\n" +"I2P supports a standard plugins interface for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -581,76 +484,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"Further information on the naming system is " -"available." +"Further information on the naming system is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P does support them. Complex applications may specify a " -"protocol,\n" +"I2P does support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the datagram page for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -660,25 +544,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -689,29 +566,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the datagram page for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -721,10 +590,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The full streaming library is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the Streaming development guide." +"The full streaming library is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the Streaming development guide." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -732,13 +599,10 @@ msgstr "" msgid "" "BOB is the Basic Open Bridge,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this I2P Site." msgstr "" @@ -749,43 +613,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the Simple Anonymous Messaging protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the Simple Anonymous Messaging protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -800,28 +657,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -832,13 +681,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 msgid "Datagrams" -msgstr "" +msgstr "مخطط البيانات" #: i2p2www/pages/site/get-involved/develop/applications.html:277 msgid "Recommended for UDP-like applications" @@ -847,8 +695,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The Datagram library allows sending UDP-" -"like packets.\n" +"The Datagram library allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -867,14 +714,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"I2CP itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"I2CP itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -883,17 +726,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the streaming library or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the streaming library or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -903,8 +743,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -926,32 +765,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -960,47 +792,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1012,12 +836,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown above).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown above).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1042,8 +863,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1062,8 +883,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1092,20 +912,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"Transport Keys to push changes to remote " -"servers." +"Transport Keys to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"import the\n" -"developer commit keys, but only Monotone \n" -"server operators will need to import the transport keys." +"import the\n" +"developer commit keys, but only Monotone \n" +"server operators will need to import the transport keys." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1177,8 +993,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1191,24 +1006,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of anyone " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of anyone to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1218,22 +1024,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1269,21 +1067,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "GPL'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1307,10 +1100,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1321,8 +1112,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1335,10 +1125,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "See developers' license agreements." msgstr "" @@ -1348,7 +1136,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1357,7 +1146,8 @@ msgid "Download code signing certificate" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:10 -msgid "Mac OSX installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Mac OSX installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:16 @@ -1369,7 +1159,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1377,13 +1168,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1391,7 +1183,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1400,8 +1193,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1433,35 +1225,28 @@ msgstr "أخريات" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"Tip: To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"Tip: To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"Tip: To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"Tip: To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"Tip: To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"Tip: To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"Tip: To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"Tip: To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1469,29 +1254,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1518,12 +1297,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1533,10 +1310,8 @@ msgstr "المجتمع" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1558,8 +1333,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1567,13 +1342,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1582,8 +1358,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1597,34 +1372,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1634,62 +1403,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" -"Tag strings for translation where appropriate, which is true for all UI " -"strings.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Tag strings for translation where appropriate, which is true for all UI strings.\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1716,20 +1472,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1738,14 +1493,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1755,12 +1510,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:223 @@ -1784,8 +1540,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -1812,12 +1567,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:292 @@ -1832,26 +1584,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:2 msgid "Using an IDE with I2P" -msgstr "" +msgstr "استخدام IDE مع I2P" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (i2p.i2p) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (i2p.i2p) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (i2p.i2p and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (i2p.i2p and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -1868,8 +1620,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -1886,14 +1638,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (i2p.i2p and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (i2p.i2p and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -1972,34 +1724,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of Complication's original\n" +"This is a revised version of Complication's original\n" " guide detailing the use of Monotone in I2P development.\n" -" For basic instructions see the quick-start " -"guide." +" For basic instructions see the quick-start guide." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered Monotone (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a license agreement needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered Monotone (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a license agreement needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2009,20 +1753,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" "
    \n" -"
  • pull code from a server which doesn't allow global read " -"access
  • \n" +"
  • pull code from a server which doesn't allow global read access
  • \n" "
  • push code to any server
  • \n" "
  • run a Monotone server
  • \n" "
" @@ -2039,22 +1779,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" next section. " -"If you want\n" +" next section. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under $HOME/.monotone/keys in " -"text files which\n" +"Monotone stores keys under $HOME/.monotone/keys in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2066,10 +1803,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2079,38 +1814,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After importing the " -"developers' keys into Monotone and\n" -" setting up trust " -"evaluation hooks,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After importing the developers' keys into Monotone and\n" +" setting up trust evaluation hooks,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2128,23 +1855,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named i2p.mtn." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" i2p.mtn file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named i2p.mtn. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" i2p.mtn file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2158,11 +1879,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n" -" file. Create this file (e.g. keys.txt) in the same " -"directory where i2p.mtn is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n" +" file. Create this file (e.g. keys.txt) in the same directory where i2p.mtn is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2173,34 +1891,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory $HOME/.monotone and open " -"the file\n" -" monotonerc with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory $HOME/.monotone and open the file\n" +" monotonerc with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2213,18 +1924,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within I2PTunnel before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized i2p.mtn. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized i2p.mtn. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the pull operation in different ways." msgstr "" @@ -2238,16 +1945,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2267,67 +1972,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With monotonerc configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where i2p.mtn was created and attempt a checkout " -"of the I2P branch:" +"With monotonerc configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where i2p.mtn was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named i2p.i2p should not appear. You " -"should encounter many\n" +"A directory named i2p.i2p should not appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" monotonerc that was created above. If you didn't create a " -"backup\n" -" as advised, re-read Setting up trust evaluation hooks." +" monotonerc that was created above. If you didn't create a backup\n" +" as advised, re-read Setting up trust evaluation hooks." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the next\n" +"If you already have a branch checked out, skip to the next\n" " section." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where i2p.mtn is located. Over " -"there issue:" +"Change into the directory where i2p.mtn is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" i2p.i2p should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" i2p.i2p should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " i2p.mtn is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your i2p.i2p directory, and over there issue:" +msgid "" +"Now change into your i2p.i2p directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2351,8 +2046,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2368,44 +2063,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section Obtaining and deploying " -"developers' keys." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section Obtaining and deploying developers' keys." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2413,8 +2098,7 @@ msgid "" "Permissions are granted by editing the files\n" " /etc/monotone/read-permissions and\n" " /etc/monotone/write-permissions. You'll also need to edit\n" -" /etc/default/monotone to enable monotone to start at boot " -"or to\n" +" /etc/default/monotone to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2472,8 +2156,7 @@ msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:26 @@ -2486,10 +2169,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at Thinking in Java." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at Thinking in Java." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:37 @@ -2499,8 +2180,7 @@ msgid "" "the other \"how\" documents,\n" "the tech intro,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:47 @@ -2512,10 +2192,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"Trac issues have also been migrated to gitlab, " -"however Trac still available for now. Two-way syncing of\n" +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to gitlab, however Trac still available for now. Two-way syncing of\n" "issues between Gitlab and Github is a work-in-progress." msgstr "" @@ -2532,13 +2210,11 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(Sun JDK 6 strongly recommended) and\n" "Apache ant\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:91 @@ -2567,51 +2243,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"See the bottom of the licenses page " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." +"See the bottom of the licenses page for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have additional guidelines for regular" -" developers." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have additional guidelines for regular developers." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the New Translator's Guide\n" +"Website and router console translators: See the New Translator's Guide\n" "for next steps." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "YourKit Java Profiler and\n" "YourKit .NET Profiler." msgstr "" @@ -2631,11 +2295,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"Transifex and request to join a translation" -" team. \n" +"Transifex and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -2650,10 +2312,8 @@ msgstr "التجهيز" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on this wiki " -"page." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on this wiki page." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -2673,12 +2333,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"./extract-messages.sh\" to generate a " -"messages.pot in the base directory.\n" -"Edit the header of this file, then run \"./init-new-po.sh " -"locale\" to generate the file\n" -"i2p2www/translations/locale/LC_MESSAGES/messages.po. " -"\"mtn add\" this file." +"Run \"./extract-messages.sh\" to generate a messages.pot in the base directory.\n" +"Edit the header of this file, then run \"./init-new-po.sh locale\" to generate the file\n" +"i2p2www/translations/locale/LC_MESSAGES/messages.po. \"mtn add\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -2689,27 +2346,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to i2p2www/static/images/flags/ for " -"the menu (copy from the router)." +"Add a flag image file to i2p2www/static/images/flags/ for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "Edit files:\n" "Edit i2p2www/translations/locale/LC_MESSAGES/messages.po.\n" -"To work with .po files efficiently, you may wish to use POEdit" +"To work with .po files efficiently, you may wish to use POEdit" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "Check in:\n" -"\"mtn pull\", \"mtn update\". Then check in by " -"\"mtn ci -k yourname@mail.i2p file1 file2 ...\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p\".\n" +"\"mtn pull\", \"mtn update\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...\"\n" +"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -2725,10 +2378,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"Transifex and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"Transifex and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -2746,8 +2397,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -2760,19 +2410,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "Create files:\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file foo_xx.bar for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar for your language.\n" "Then \"mtn add\" the file.\n" -"After creating a .po file, edit the headers. Then run \"ant " -"distclean poupdate\"." +"After creating a .po file, edit the headers. Then run \"ant distclean poupdate\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -2780,15 +2426,13 @@ msgid "" "Start to work:\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use POEdit" +"To work with .po files efficiently, you may wish to use POEdit" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in #i2p-dev on IRC." +"If you have questions about the meaning of the terms in the console, ask in #i2p-dev on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -2797,8 +2441,8 @@ msgstr "أسئلة متكررة" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -2814,67 +2458,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right before you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right before you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "In summary:\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -2899,10 +2541,8 @@ msgstr "نظرة عامة" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -2911,21 +2551,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -2948,8 +2584,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -2959,19 +2594,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" -"the SSL public key certificate (only if selfsigned), and the su3 public " -"key certificate.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" +"the SSL public key certificate (only if selfsigned), and the su3 public key certificate.\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -2981,10 +2610,8 @@ msgstr "سياسة الخصوصية" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -2993,17 +2620,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3012,10 +2637,8 @@ msgstr "ابدء" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3026,18 +2649,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/ar/LC_MESSAGES/priority.po b/i2p2www/translations/ar/LC_MESSAGES/priority.po index e95e02af..88062a0e 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/priority.po +++ b/i2p2www/translations/ar/LC_MESSAGES/priority.po @@ -1,55 +1,56 @@ -# Arabic translations for I2P. -# Copyright (C) 2021 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Mahmod Al-Hussaini , 2019 +# ManeraKai , 2023 # sfmousa , 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-11-08 21:15+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: Ali \n" -"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" +"PO-Revision-Date: 2013-02-03 00:02+0000\n" +"Last-Translator: ManeraKai , 2023\n" +"Language-Team: Arabic (http://app.transifex.com/otf/I2P/language/ar/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" -msgstr "" +msgstr "فئة المدونة" #: i2p2www/pages/blog/category.html:4 #, python-format msgid "I2P Blog ATOM Feed for Category: %(category)s" -msgstr "" +msgstr "تقليم أتوم لمدونة I2P للفئة: %(category)s" #: i2p2www/pages/blog/index.html:2 i2p2www/pages/blog/post.html:3 #: i2p2www/pages/global/nav.html:186 msgid "Blog" -msgstr "مدونة" +msgstr "المدونة" #: i2p2www/pages/blog/index.html:4 i2p2www/pages/site/index.html:43 msgid "I2P Blog ATOM Feed" -msgstr "" +msgstr "تقليم أتوم لمدونة I2P" #: i2p2www/pages/blog/index.html:18 #, python-format msgid "Posted %(date)s by %(author)s" -msgstr "" +msgstr "نُشر %(date)s بواسطة %(author)s" #: i2p2www/pages/blog/latest.html:5 msgid "More blog posts…" -msgstr "" +msgstr "المزيد من مشورات المدونة…" #: i2p2www/pages/blog/post.html:12 msgid "Posted:" -msgstr "" +msgstr "نُشر" #: i2p2www/pages/blog/post.html:13 msgid "Author:" @@ -57,678 +58,613 @@ msgstr "المؤلف:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P and to utilize the outproxies available within I2P. Below are " +"Your web browser will need to be configured in order to browse web sites on " +"I2P and to utilize the outproxies available within I2P. Below are " "walkthroughs for some of the most popular browsers." -msgstr "" +msgstr "يجب على متصفحك أن يُهيئ لأجل تصفح مواقع الويب على I2P واستخدام الوكلاء المخرجين المتاحين ضمن I2P. أدناه تعليمات لأشهر المتصفحات." #: i2p2www/pages/downloads/browser-content.html:3 msgid "Firefox Profile for Windows" -msgstr "" +msgstr "الملف الشخصي لفيرفكس للويندوز" #: i2p2www/pages/downloads/browser-content.html:4 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" " Firefox profile." -msgstr "" +msgstr "إذا كنت تستخدم الويندوز، فالطريقة الموصى بها للوصول إلى I2P هي باستخدام\nالملف الشخصي لفيرفكس." #: i2p2www/pages/downloads/browser-content.html:6 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -" configure your browser yourself. Read below on how to that." -msgstr "" +"If you do not wish to use that profile or are not on Windows, you need to " +"configure your browser yourself. Read below on how to that." +msgstr "إذا لم ترد استخدام ذلك الملف الشخصي أو لم تكن تستخدم الويندوز، فستحتاج إلى تهيئة متصفحك بنفسك. اقرأ أدناه لمعرفة كيفية ذلك." #: i2p2www/pages/downloads/browser-content.html:8 msgid "How to configure your browser" -msgstr "" +msgstr "كيفية تهييء متصفحك" #: i2p2www/pages/downloads/browser-content.html:15 #: i2p2www/pages/downloads/browser-content.html:89 msgid "Outproxy Terms Of Service" -msgstr "" +msgstr "شروط الاستخدام للوسيط المُخرج" #: i2p2www/pages/downloads/browser-content.html:20 msgid "Extension-based Configuration: I2P in Private Browsing" -msgstr "" +msgstr "تهيئة قائمة على إضافة: I2P في التصفح الخفي" #: i2p2www/pages/downloads/browser-content.html:21 msgid "" -"A new way of automatically configuring the I2P Browser is currently being" -" tested. It uses the Firefox's \"Container Tabs\" to build private " -"browsing tools for use with I2P and I2P applications." -msgstr "" +"A new way of automatically configuring the I2P Browser is currently being " +"tested. It uses the Firefox's \"Container Tabs\" to build private browsing " +"tools for use with I2P and I2P applications." +msgstr "تُتخبر في هذه الأيام طريقة جديدة لتهيئة متفصح I2P. تستخدم \"التبويبات الحاوية\" في فيرفكس لبناء أدوات تصفح خصوصية لاستخدامها مع I2P وتطبيقات I2P." #: i2p2www/pages/downloads/browser-content.html:22 msgid "" -"It does pre-configuration of your browser by enabling some of the privacy" -" Browser Settings like ResistFingerprinting, and enforces WebRTC proxy " -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving Firefox's integration\n" -" with I2P. It should not substantially interfere with your non-I2P " -"Firefox tabs. " -msgstr "" +"It does pre-configuration of your browser by enabling some of the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy obedience. It also contains menus, shortcuts, and monitoring tools improving Firefox's integration\n" +" with I2P. It should not substantially interfere with your non-I2P Firefox tabs. " +msgstr "تُهيئ متصفحك مسبقًا بتفعيل بعض إعدادات المتصفح الخصوصية مثل \"مقاومة التبصيم\"، وتفرض أن يعمل الـ WebRTC عبر الوسيط. تحتوي أيضًا على قوائم، اختصارات، وأدوات مراقبة لتحسين اندماج فيرفكس مع I2P. لا يجب عليها أن تؤثر بشكل كبير على تبويباتك الغير I2P." #: i2p2www/pages/downloads/browser-content.html:24 msgid "" -"The extension, I2P in Private Browsing, can be obtained " -"from the Mozilla addon store. " -msgstr "" +"The extension, I2P in Private Browsing, can" +" be obtained from the Mozilla addon store. " +msgstr "الإضافة، I2P in Private Browsing، يمكن الحصول من متجر موزيلا للإضافات." #: i2p2www/pages/downloads/browser-content.html:25 msgid "" "The source code for the extension is available at i2pgit.org. " -msgstr "" +msgstr "كود مصدر الإضافة متاح على i2pgit.org." #: i2p2www/pages/downloads/browser-content.html:26 msgid "Instructions for Firefox 57 and above:" -msgstr "" +msgstr "التعليمات لفيرفكس 57 فما فوق:" #: i2p2www/pages/downloads/browser-content.html:27 msgid "" -"From the Menu button in the top right, select Preferences. " -"Scroll down until you see the Network Proxy section, as shown in" -" the screenshot below. Click on Settings" -msgstr "" +"From the Menu button in the top right, select Preferences. Scroll " +"down until you see the Network Proxy section, as shown in the " +"screenshot below. Click on Settings" +msgstr "من زر القائمة أعلى يسار المتصفح، حدد الإعدادات. انزل إلى تحت لحد ما ترى إعدادات الشبكة، كما يُرى في الصورة أدناه. اضغط على الإعدادات" #: i2p2www/pages/downloads/browser-content.html:28 msgid "Firefox57 Network Options" -msgstr "" +msgstr "خيارات شبكة فيرفكس57" #: i2p2www/pages/downloads/browser-content.html:29 msgid "" "In the Connection Settings pop-up, select Manual proxy\n" " configuration. Set both the HTTP and SSL Proxy to address\n" -" 127.0.0.1 with port 4444 as shown in the " -"following screenshot." -msgstr "" +" 127.0.0.1 with port 4444 as shown in the following screenshot." +msgstr "في منبثقة إعدادات الاتصال، حدد إعداد الوسيط، يدويا. ضع كلا من وسيط HTTP و SSL إلى عنوان 127.0.0.1 مع منفذ 4444 كما يُعرض في الصورة أدناه." #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "Firefox57\n" "Connection Settings" -msgstr "" +msgstr "فيرفكس57\nإعدادات اتصال" #: i2p2www/pages/downloads/browser-content.html:34 msgid "Firefox57 Connection Settings" -msgstr "" +msgstr "إعدادات اتصال فيرفكس57" #: i2p2www/pages/downloads/browser-content.html:35 msgid "" "Finally, go to the address about:config and find the property " "media.peerConnection.ice.proxy_only. Ensure that this setting is True." -msgstr "" +msgstr "أخيرًا، اذهب إلى العنوان about:config وابحث عن التفضيل media.peerConnection.ice.proxy_only. صحح عليه ليكون true." #: i2p2www/pages/downloads/browser-content.html:37 msgid "" "Firefox57\n" "PeerConnection Settings" -msgstr "" +msgstr "فيرفكس57\nإعدادات اتصال النظير" #: i2p2www/pages/downloads/browser-content.html:38 msgid "Firefox57 PeerConnection Settings" -msgstr "" +msgstr "إعدادات اتصال النظير فيرفكس57" #: i2p2www/pages/downloads/browser-content.html:41 msgid " Chrome " -msgstr "" +msgstr "كروم" #: i2p2www/pages/downloads/browser-content.html:42 msgid "" "Extension-based Configuration: I2PChrome.js(Experimental, additional " "configuration)" -msgstr "" +msgstr "تهيئة قائمة على إضافة: I2PChrome.js (تجريبية، تهيئة إضافية)" #: i2p2www/pages/downloads/browser-content.html:43 msgid "" -"An experimental, partially-automated configuration process for Chrome is " -"available. In order to configure it, create a new Profile " -"especially for your I2P browsing, separate from the default profile. Then" -" install this Extension" -" in your newly-created profile. This profile is now configured to use " -"I2P. Highly detailed instructions are available at the\n" -" homepage. " -msgstr "" +"An experimental, partially-automated configuration process for Chrome is available. In order to configure it, create a new Profile especially for your I2P browsing, separate from the default profile. Then install this Extension in your newly-created profile. This profile is now configured to use I2P. Highly detailed instructions are available at the\n" +" homepage. " +msgstr "هناك طريقة تهيئة جزء تلقائية لكروم. لأجل تهيئتها، اصنع ملف شخصي جديد مخصص لتصفح I2P، منفصل عن الملف الشخصي الافتراضي. بعدها ثبت هذه الإضافة في ملفك الشخصي الجديد. هذا الملف الشخصي أصبح الآن مهيئ لاستخدام I2P. التعليمات المفصلة متاحة في الصفحة الرئيسية." #: i2p2www/pages/downloads/browser-content.html:45 msgid "All Chrome Versions" -msgstr "" +msgstr "كل إصدارات كروم" #: i2p2www/pages/downloads/browser-content.html:46 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their proxy settings depending on variant and platform. These " -"instructions may be slightly different in Brave or Iridium, for instance." -" From the Main menu, navigate\n" -" to the Settings, and search for the menu item. " -"Clicking it will open the right settings for your platform." -msgstr "" +"Chromium-Based Browsers like Chrome have slightly different places for their proxy settings depending on variant and platform. These instructions may be slightly different in Brave or Iridium, for instance. From the Main menu, navigate\n" +" to the Settings, and search for the menu item. Clicking it will open the right settings for your platform." +msgstr "المتصفحات المبنية على كروميوم مثل كروم لديها مكان إعدادات الوسيط مختلفة قليلًا. هذه التعليمات قد تكون مختلفة قليلًا من Brave أو Iridium على سبيل المثال. من القائمة الرئيسية، اذهب إلى Settings، وابحث عن proxy. ومن ثم اضغط على النتيجة." #: i2p2www/pages/downloads/browser-content.html:48 msgid "Chrome Proxy Options" -msgstr "" +msgstr "خيارات الوسيط لكروم" #: i2p2www/pages/downloads/browser-content.html:49 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used by Internet Explorer, and you can " -"configure it by following the Internet Explorer 8 guide." -msgstr "" +"On Windows, this button will launch you into the shared proxy settings used " +"by Internet Explorer, and you can configure it" +" by following the Internet Explorer 8 guide." +msgstr "في ويندوز، هذا الزر سينقلك إلى إعدادات الوسيط المشتركة التي يستخدمها إنترنت إكسبلورر، وتستطيع تهيئتها بقراءة تعليمات إنترنت إكسبلورر 8 أدناه في هذه الصفحة." #: i2p2www/pages/downloads/browser-content.html:52 msgid " IceRaven and other Firefoxes for Android " -msgstr "" +msgstr "IceRaven وفيرفُكسات أخرى لأندرويد" #: i2p2www/pages/downloads/browser-content.html:53 msgid "Extension-based Configuration" -msgstr "" +msgstr "تهيئة قائمة على إضافة" #: i2p2www/pages/downloads/browser-content.html:54 msgid "" -"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an " -"about:config page for you to configure proxy settings manually. It is " -"further not possible to use most extensions in Fenix-based Firefoxes. It " -"is possible to enable support\n" -" about:config and enable more extensions in Firefox Nightly at the " -"time of this writing, but it's a manual and difficult process. " -"IceRaven is a fork of Firefox which enables a collection of " -"extensions while Mozilla and the Mozilla Community\n" -" work on adding support for extensions to Firefox for Android. It " -"provides the easiest way of configuring a modern Firefox-based Browser " -"for Android. It does not come from Mozilla and carries no guarantees from" -" them. Installing the extension\n" +"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an about:config page for you to configure proxy settings manually. It is further not possible to use most extensions in Fenix-based Firefoxes. It is possible to enable support\n" +" about:config and enable more extensions in Firefox Nightly at the time of this writing, but it's a manual and difficult process. IceRaven is a fork of Firefox which enables a collection of extensions while Mozilla and the Mozilla Community\n" +" work on adding support for extensions to Firefox for Android. It provides the easiest way of configuring a modern Firefox-based Browser for Android. It does not come from Mozilla and carries no guarantees from them. Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P." -msgstr "" +msgstr "متصفحات فينكس (فيرفكس للأندرويد) على الأغلب لا يكون لديهم صفحة about:config لتهيئة إعدادات الوسيط يديويًا. وإضافةً على ذلك ليس من الممكن استخدام أغلب الإضافات فيهم. من الممكن تفعيل دعم about:config وتفعيل إضافات أكثر على متصفح فيرفكس الإصدار الليلي، ولكنها عملية يدوية وصعبة. متصفح IceRaven هو مشروع متفرع من فيرفكس والذي يُفعل مجموعة من الإضافات. بذلك فهو أسهل طريقة لتهيئتة متصفح فيفركس أندرويد لـ I2P. لا يأتي من موزيلا ولا يحمل أي ضمان منهم." #: i2p2www/pages/downloads/browser-content.html:58 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been using IceRaven for a while, go to the main menu, select the History " -"tab, and make sure that you have cleared information about your past " -"browsing by tapping the \"Delete\n" +"If you have not installed IceRaven yet, go to the next step. If you have been using IceRaven for a while, go to the main menu, select the History tab, and make sure that you have cleared information about your past browsing by tapping the \"Delete\n" " History\" button." -msgstr "" +msgstr "إذا لم تكن قد ثبت IceRaven حتى الآن، فاذهب إلى الخطوة التالية. إذا كنت قد استخدمت IceRaven لفترة، فاذهب إلى القائمة الرئيسية، حدد على الـ History tab، وتأكد من أنك قد حذفت معلومات تصفحك السابقة بالضغط على Delete History." #: i2p2www/pages/downloads/browser-content.html:60 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-" -"Ons\" submenu. Install the extension named I2P Proxy for Android and " -"other Systems. " -msgstr "" +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-" +"Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" " +"submenu. Install the extension named I2P Proxy for Android and other " +"Systems. " +msgstr "اذهب إلى القائمة الئيسية، وانزل إلى تحت لحد ما ترى القائمة الفرعية Add-Ons. اضغط على خيار Add-Ons Manager في القائمة الفرعية Add-Ons. ثبت الإضافة المسماة I2P Proxy for Android and other Systems." #: i2p2www/pages/downloads/browser-content.html:61 msgid "Your IceRaven browser is now configured to use I2P. " -msgstr "" +msgstr "الآن أصبح متفحك IceRaven مهيئ ليستخدم I2P." #: i2p2www/pages/downloads/browser-content.html:62 msgid "" -"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web " -"browsers, if installed from the following addons.mozilla.org URL.\n" -" I2P Proxy for Android and Other Systems\n" -msgstr "" +"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web browsers, if installed from the following addons.mozilla.org URL.\n" +" I2P Proxy for Android and Other Systems\n" +msgstr "هذه الإضافة تعمل أيضًا على متصفحات فينكس ما قبل 68 (فيرفكس ما قبل 68)، إذا ثبتها من خلال عنوان addons.mozilla.org.\nI2P Proxy for Android and Other Systems\n" #: i2p2www/pages/downloads/browser-content.html:65 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." -msgstr "" +"This extension is identical to the Chromium extension and is built from the " +"same source." +msgstr "هذه الإضافة هي طبق الأصل لإضافة كروميوم ومبنية من نفس المصدر." #: i2p2www/pages/downloads/browser-content.html:66 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their Blog" -msgstr "" +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their Blog" +msgstr "لإضافة دعم الإضافات على فيرفكس الإصدار الليلي، تابع الخطوات المتاحة من موزيلا في مدونتهم" #: i2p2www/pages/downloads/browser-content.html:71 msgid "Internet Explorer" -msgstr "" +msgstr "إنترنت إكسبلورر" #: i2p2www/pages/downloads/browser-content.html:72 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." -msgstr "" +msgstr "في قائمة البدء ابحث عن \"الشبكة وإعدادات الإنترنت\" لفتح الإعدادات. آخر رابط في القائمة هو إعدادات الوسيط، اضغط عليه تهيئة وسيطك للاتصال بـ I2P؟" #: i2p2www/pages/downloads/browser-content.html:77 msgid "IE Internet Options" -msgstr "" +msgstr "إعدادات إنترنت إكسبلورر" #: i2p2www/pages/downloads/browser-content.html:78 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." -msgstr "" +msgstr "صحح على \"استخدم خادم وسيط لشبكتك المحلية\". اكتب للعنوان \"127.0.0.1\" وللمنفذ \"4444\". ومن ثم عند الاستثناءات، اكتب \"127.0.0.1, localhost\". واضغط على حفظ." #: i2p2www/pages/downloads/browser-content.html:85 msgid "IE Proxy Settings" -msgstr "" +msgstr "إعدادات وسيط إنترنت إكسبلورر" #: i2p2www/pages/downloads/browser-content.html:90 msgid "" "I2P is not designed for creating proxies to the Internet.\n" "Instead, it is meant to be used as an internal network." -msgstr "" +msgstr "لم يصمم I2P لأن يكون وسيط للإنترنت.\nولكنه صمم ليُستخدم كشبكة داخلية." #: i2p2www/pages/downloads/browser-content.html:94 msgid "" -"

The I2P project itself does not run any proxies to the " -"Internet.\n" +"

The I2P project itself does not run any proxies to the Internet.\n" "The I2P software includes a default outproxy: exit.stormycloud.i2p.\n" "These are run by a volunteer.

\n" "https://stormycloud.org" -msgstr "" +msgstr "

مشروع I2P نفسه لا يُشغل أي وسطاء إلى الإنترنت.\nبرمجية I2P تحتوي على وسيط مخرّج افتراضي: exit.stormycloud.i2p.\nهذا الوسيط مُشغل من أشخاص متطوعين.

\nhttps://stormycloud.org" #: i2p2www/pages/downloads/browser-content.html:101 #, python-format -msgid "By default, I2P comes with one outproxy configured: %(http)s." -msgstr "" +msgid "" +"By default, I2P comes with one outproxy configured: %(http)s." +msgstr "بشكل افتراضي، يأتي I2P مع وسيط مخرّج واحد: %(http)s." #: i2p2www/pages/downloads/browser-content.html:104 msgid "" "I2P Sites that are accessible via .i2p addresses are also\n" "not allowed via the outproxies." -msgstr "" +msgstr "مواقع I2P الممكن الوصول إليها من عناوين .i2p ليست متاحة للوسطاء المخرّجين." #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Tor provides a browser to use " -"as an outproxy to the Internet." -msgstr "" +"Tor provides a browser to use as " +"an outproxy to the Internet." +msgstr "تور يوفر متصفح ليُستخدم كوسيط مخرّج للإنترنت." #: i2p2www/pages/downloads/config.html:2 i2p2www/pages/site/faq.html:19 msgid "Configuration" -msgstr "التهيئة." +msgstr "التهيئة" #: i2p2www/pages/downloads/debian.html:4 msgid "Debian I2P Packages" -msgstr "" +msgstr "حزم I2P دبيان" #: i2p2www/pages/downloads/debian.html:6 msgid "Debian or Ubuntu, All Versions" -msgstr "" +msgstr "دبيان أو أوبونتو، كل الإصدارات" #: i2p2www/pages/downloads/debian.html:7 msgid "The Debian packages should work on most platforms running:" -msgstr "" +msgstr "يجب أن تعمل حزم دبيان على أغلب المنصات التي تُشغل:" #: i2p2www/pages/downloads/debian.html:9 msgid "Ubuntu (Bionic 18.04 and newer)" -msgstr "" +msgstr "أوبونتو (بَيونِك 18.04 وأجدد) " #: i2p2www/pages/downloads/debian.html:10 msgid "Mint(Tara19) or newer" -msgstr "" +msgstr "مِنت (تارا 19) أو أجدد" #: i2p2www/pages/downloads/debian.html:11 msgid "Debian Linux (Buster and newer)" -msgstr "" +msgstr "دبيان لينكس (باستِر وأجدد)" #: i2p2www/pages/downloads/debian.html:15 #, python-format msgid "" -"The I2P packages may work on systems not listed above. Please " -"report any issues\n" +"The I2P packages may work on systems not listed above. Please report any issues\n" "with these packages on Gitlab at\n" "i2p.i2p." -msgstr "" +msgstr "حزم I2P هذه قد تعمل على أنظمة غير مدرجة هنا. رجاءً أبلغ عن أي مشكلة مع هذه الحزم على Gitlab على i2p.i2p." #: i2p2www/pages/downloads/debian.html:21 msgid "" "Option 1: Recent versions of Ubuntu and its " "derivatives (Try this if you're not using Debian)" -msgstr "" +msgstr "الخيار 1: الإصدارات الحديثة من أوبونتو واشتقاقاته (جرب هذا إذا كنت لا تستخدم دبيان)" #: i2p2www/pages/downloads/debian.html:22 msgid "Option 2: Debian (including Debian-derivatives)" -msgstr "" +msgstr "الخيار 2: دبيان (وأيضًا اشتقاقاته)" #: i2p2www/pages/downloads/debian.html:25 msgid "Instructions for Ubuntu and derivatives like Linux Mint & Trisquel" -msgstr "" +msgstr "الخطوات لأوبونتو واشتقاقاته مثل لينكس مينت و Trisquel" #: i2p2www/pages/downloads/debian.html:26 msgid "Adding the PPA via the command line and installing I2P" -msgstr "" +msgstr "إضافة الـ PPA وتثبيت I2P عبر موجه الأوامر." #: i2p2www/pages/downloads/debian.html:29 msgid "Open a terminal and enter:" -msgstr "" +msgstr "افتح طرفية واكتب:" #: i2p2www/pages/downloads/debian.html:31 msgid "" -"This command will add the PPA to /etc/apt/sources.list.d and" -" fetch\n" -"the gpg key that the repository has been signed with. The GPG key ensures" -"\n" +"This command will add the PPA to /etc/apt/sources.list.d and fetch\n" +"the gpg key that the repository has been signed with. The GPG key ensures\n" "that the packages have not been tampered with since being built." -msgstr "" +msgstr "هذا الأمر سيضيف الـ PPA إلى /etc/apt/sources.list.d وسيجلب مفتاح الـ GPG الذي وُقِّع به المستودع. يتأكد مفتاح الـ GPG على أن الحزمة لم يتم التلاعب بها." #: i2p2www/pages/downloads/debian.html:38 msgid "Notify your package manager of the new PPA by entering:" -msgstr "" +msgstr "أبلغ مدير الحزم لديك بالـ PPA الجديدة بكتابة:" #: i2p2www/pages/downloads/debian.html:40 msgid "" "This command will retrieve the latest list of software from each\n" "repository that is enabled on your system, including the I2P PPA that\n" "was added with the earlier command." -msgstr "" +msgstr "هذا الأمر سيجلب آخر قائمة للبرمجيات من كل مستودع مفعل على نظامك، من ضمنهم الـ I2P PPA التي أضفناها منذ قليل." #: i2p2www/pages/downloads/debian.html:46 msgid "You are now ready to install I2P!" -msgstr "" +msgstr "أصبحت الآن جاهزًا لتثبيت I2P!" #: i2p2www/pages/downloads/debian.html:50 msgid "Adding the PPA Using the Software Center" -msgstr "" +msgstr "إضافة الـ PPA باستخدام مركز البرمجيات" #: i2p2www/pages/downloads/debian.html:53 msgid "Open \"Software and Updates\" via the applications menu." -msgstr "" +msgstr "افتح \"البرمجيات والتحديثات\" من قائمة التطبيقات." #: i2p2www/pages/downloads/debian.html:58 msgid "" "Select the \"Other Software\" tab and click the \"Add\" button at the\n" " bottom to configure the PPA." -msgstr "" +msgstr "حدد تبويبة \"برمجيات أخرى\" واضغط على زر \"إضافة\" لتهيئة الـ PPA." #: i2p2www/pages/downloads/debian.html:64 msgid "" "Add the PPA by pasting the URL: ppa:i2p-maintainers/i2p\n" " into the PPA dialog." -msgstr "" +msgstr "أضف الـ PPA بلصق العنوان ppa:i2p-maintainers/i2pفي حقل الإدخال. " #: i2p2www/pages/downloads/debian.html:70 msgid "Download the repository information with the \"Reload\" button." -msgstr "" +msgstr "حمل معلومات المستودع بالضغط على زر \"إعادة التحميل\"" #: i2p2www/pages/downloads/debian.html:75 msgid "" "Install the I2P software using the \"Software\" tool from the\n" " applications menu." -msgstr "" +msgstr "ثبت I2P باستخدام أداة \"البرمجيات\" من قائمة التطبيقات." #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of starting I2P and configuring " -"it for your system." -msgstr "" +"part of starting I2P and configuring it for your system." +msgstr "تستطيع الآن بعد انتهاء عملية التثبيت أن تذهب إلى جزء تشغيل I2P وتهيئته لنظامك." #: i2p2www/pages/downloads/debian.html:87 msgid "Instructions for Debian" -msgstr "" +msgstr "تعليمات لدبيان" #: i2p2www/pages/downloads/debian.html:89 msgid "Currently supported architectures" -msgstr "" +msgstr "المعماريات المدعومة حاليًا" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with su or by prefixing each command with " -"sudo)." -msgstr "" +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with su or by prefixing each command with sudo)." +msgstr "ملاحظة: الخطوات أدناه يجب أن تؤدى بوصول جذري (غيِّر المستخدم إلى الجذر باستخدام su أو باستباق الأوامر بـ sudo)." #: i2p2www/pages/downloads/debian.html:96 msgid "" -"Ensure that apt-transport-https, curl, lsb-release are installed." -msgstr "" +"Ensure that apt-transport-https, curl, lsb-" +"release are installed." +msgstr "تأكد من أن apt-transport-https، curl، lsb-release مثبتين" #: i2p2www/pages/downloads/debian.html:103 #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the Debian wiki\n" +" Check which version of Debian you are using on this page at the Debian wiki\n" " and verify with %(file2)s on your system.\n" -" Then, for Debian Bullseye or newer distributions run the following " -"command to create %(file)s." -msgstr "" +" Then, for Debian Bullseye or newer distributions run the following command to create %(file)s." +msgstr "\nتحقق أي إصدار دبيان تستخدمه على هذه الصفحة في موسوعة دبيان بقراءة ملف %(file2)s.\nبعد ذلك، لدبيان Bullseye أو أجدد اكتب التالي لإنشاء %(file)s." #: i2p2www/pages/downloads/debian.html:125 #, python-format msgid "Download the key used to sign the repository:" -msgstr "" +msgstr "حمل المفتاح المستخدم لتوقيع المستودع:" #: i2p2www/pages/downloads/debian.html:135 msgid "Display the key fingerprint." -msgstr "" +msgstr "اعرض بصمة المفتاح." #: i2p2www/pages/downloads/debian.html:141 msgid "Verify that this key fingerprint matches the output:" -msgstr "" +msgstr "تأكد من أن بصمة المفتاح مطابقة لأدناه:" #: i2p2www/pages/downloads/debian.html:150 msgid "Copy the keyring to the keyrings directory:" -msgstr "" +msgstr "انسخ حلقة المفاتيح إلى مجلد حلقات المفاتيح:" #: i2p2www/pages/downloads/debian.html:164 msgid "Notify your package manager of the new repository by entering:" -msgstr "" +msgstr "أبلغ مدير الحزم لديك عن المستودع الجديد بكتابة:" #: i2p2www/pages/downloads/debian.html:168 msgid "" "This command will retrieve the latest list of software\n" -" from every repository enabled on your system, including the I2P " -"repository\n" +" from every repository enabled on your system, including the I2P repository\n" " added in step 1." -msgstr "" +msgstr "هذا الأمر سيجلب أحدث قائمة للبرمجيات من كل مستودع مفعل في النظام، ضمنهم مستودع I2P الذي أضفناه في الخطوة 1." #: i2p2www/pages/downloads/debian.html:175 msgid "" -"You are now ready to install I2P! Installing the i2p-keyring" -"\n" -" package will ensure that you receive updates to the repository's GPG " -"key." -msgstr "" +"You are now ready to install I2P! Installing the i2p-keyring\n" +" package will ensure that you receive updates to the repository's GPG key." +msgstr "أصبحت الآن مستعدًا لتثبيت I2P! سيأكد تثبيت حلقة مفتاح I2P على أنك ستستقبل تحديثات لمفتاح الـ GPG للمستودع." #: i2p2www/pages/downloads/debian.html:185 msgid "" -"After the installation process completes you can move on to the next part" -" of starting I2P and configuring it " -"for your system." -msgstr "" +"After the installation process completes you can move on to the next part of" +" starting I2P and configuring it for your" +" system." +msgstr "تستطيع الآن بعد انتهاء عملية التثبيت أن تذهب إلى الجزء التالي تشغيل I2P وتهيئته لنظامك." #: i2p2www/pages/downloads/debian.html:190 #: i2p2www/pages/downloads/post-install.html:1 msgid "Post-install work" -msgstr "" +msgstr "العمل ما بعد التثبيت" #: i2p2www/pages/downloads/debian.html:192 msgid "" "Using these I2P packages the I2P router can be started in the following\n" "three ways:" -msgstr "" +msgstr "باستخدام حزم الـ I2P هذه، يمكن تشغيل موجه الـ I2P بالطرق الثلاثة التالية:" #: i2p2www/pages/downloads/debian.html:198 msgid "" -""on demand" using the i2prouter script. Simply run " -""i2prouter\n" -"start" from a command prompt. (Note: Do " -"not use\n" +""on demand" using the i2prouter script. Simply run "i2prouter\n" +"start" from a command prompt. (Note: Do not use\n" "sudo or run it as root!)" -msgstr "" +msgstr ""عند الطلب" باستخدام النص الآلي i2prouter. ببساطة شغل "i2prouter start" من موجه الأوامر. (ملاحظة، لا تستعمل sudo أو تشغله كجذر!)" #: i2p2www/pages/downloads/debian.html:205 msgid "" -""on demand" without the java service wrapper\n" -"(needed on non-Linux/non-x86 systems) by running \"i2prouter-" -"nowrapper\".\n" +""on demand" without the java service wrapper\n" +"(needed on non-Linux/non-x86 systems) by running \"i2prouter-nowrapper\".\n" "(Note: Do not\n" "use sudo or run it as root!)" -msgstr "" +msgstr ""عند الطلب" بدون استخدام java service wrapper\n(يُحتاج على أنظمة غير اللينكس وغير x-86) بتشغيل \"i2prouter-nowrapper\". (ملاحظة: لا تستعمل sudo أو تشغله كجذر!)" #: i2p2www/pages/downloads/debian.html:213 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"dpkg-" -"reconfigure\n" -"i2p\" as root or using sudo. This is the recommended means of " -"operation." -msgstr "" +"before logging in. The service can be enabled with \"dpkg-reconfigure\n" +"i2p\" as root or using sudo. This is the recommended means of operation." +msgstr "\"كخدمة تشتغل تلقائيًا وقت تشغيل النظام، حتى قبل تسجيل الدخول\". يمكن تفعيل الخدمة باستخدام \"dpkg-reconfigure i2p\" كجذر أو باستخدام sudo. هذه هي الطريقة المستحسنة." #: i2p2www/pages/downloads/debian.html:221 msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" -"if you can. The ports to forward can be found on the \n" -"network configuration page in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find portforward.com to be" -" helpful." -msgstr "" +"When installing for the first time, please remember to adjust your NAT/firewall\n" +"if you can. The ports to forward can be found on the \n" +"network configuration page in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find portforward.com to be helpful." +msgstr "عند التثبيت لأول مرة، رجاءً تذكر أن تعدل على الـ NAT/جدار الحماية إذا استطعت. يمكن العثور على المنافذ التي يجب إعادة توجيهها في صفحة تهيئة الشبكة في لوحة تحكم الموجه. إذا احتجت دليل لفعل ذلك، فربما يكون موقع portforward.com مفيدًا لك." #: i2p2www/pages/downloads/debian.html:228 msgid "" "Please review and adjust the bandwidth settings on the\n" "configuration page,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." -msgstr "" +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." +msgstr "رجاءً راجع وغير من إعدادات النطاق الترددي في صفحة التهيئة، لأن الإعداد الافتراضي المكون من 96 KB/s تحميل و 40 KB/s رفع ليس بالجيد كثيرًا." #: i2p2www/pages/downloads/debian.html:234 #: i2p2www/pages/downloads/post-install.html:34 #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the browser proxy setup page for an easy " -"howto." -msgstr "" +"href=\"%(browserconfig)s\">browser proxy setup page for an easy howto." +msgstr "إذا أردت الوصول إلى مواقع I2P من متصفحك، فاذهب إلى صفحة إعداد وسيط المتصفح." #: i2p2www/pages/downloads/docker.html:5 msgid "Installing I2P in Docker" -msgstr "" +msgstr "تثبيت I2P في دوكر." #: i2p2www/pages/downloads/docker.html:6 msgid "Very quick start" -msgstr "" +msgstr "بداية سريعة جدًا" #: i2p2www/pages/downloads/docker.html:7 msgid "" -"If you just want to give I2P a quick try or are using it in a home " -"network, follow these steps" -msgstr "" +"If you just want to give I2P a quick try or are using it in a home network, " +"follow these steps" +msgstr "إذا أردت إعطاء I2P تجربة سريعة أو إذا كنت تستخدمه في شبكة منزلية، فتابع الخطوات التالية" #: i2p2www/pages/downloads/docker.html:9 msgid "Create two directories \"i2pconfig\" and \"i2ptorrents\"" -msgstr "" +msgstr "أنشئ مجلدين \"i2pconfig\" و \"i2ptorrents\"" #: i2p2www/pages/downloads/docker.html:10 msgid "Copy the following text and save it in a file \"docker-compose.yml\"." -msgstr "" +msgstr "انسخ النص التالي وألصقه في ملف جديد تحت اسم \"docker-compose.yml\"." #: i2p2www/pages/downloads/docker.html:21 msgid "Execute \"docker-compose up\"" -msgstr "" +msgstr "شغل \"docker-compose up\"" #: i2p2www/pages/downloads/docker.html:22 msgid "" "Start a browser and go to http://127.0.0.1:7657 to complete the setup " "wizard." -msgstr "" +msgstr "افتح متصفح واذهب إلى http://127.0.0.1:7657 لتكملة الإعدادات المسبقة." #: i2p2www/pages/downloads/docker.html:24 msgid "" "Note that this quick-start approach is not recommended for production " -"deployments on remote servers. Please read the rest of this document for" -" more information." -msgstr "" +"deployments on remote servers. Please read the rest of this document for " +"more information." +msgstr "لاحظ أن هذه الطريقة السريعة ليست بالمستحسنة للنشر الإنتاجي على خوادم متحكم بها عن بعد." #: i2p2www/pages/downloads/docker.html:25 msgid "Building an image" -msgstr "" +msgstr "صناعة image" #: i2p2www/pages/downloads/docker.html:26 msgid "" "There is an i2P image available over at DockerHub. If you do not want to use " "that one, you can build one yourself:" -msgstr "" +msgstr "هناك I2P image جاهزة على DockerHub. إذا لم ترد استخدامها، فتستطيع بناء واحدة بنفسك:" #: i2p2www/pages/downloads/docker.html:28 msgid "Running a container" -msgstr "" +msgstr "تشغيل حاوية" #: i2p2www/pages/downloads/docker.html:29 -#, fuzzy msgid "Volumes" -msgstr "المنتديات" +msgstr "السِّعات" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnark”) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnark”) " "downloads. See the example below." -msgstr "" +msgstr "تتطلب الحاوية أن يكون لديها سعة تخزينية لتهيئة البيانات ليركبوا عليها. اختياريًا، يمكنك تركيب سعة تخزينية منفصلة لتحميلات التورينت (“i2psnark”) . انظر إلى المثال أدناه." #: i2p2www/pages/downloads/docker.html:31 msgid "Memory usage" -msgstr "" +msgstr "استخدام الذاكرة" #: i2p2www/pages/downloads/docker.html:32 msgid "" "By the default the image limits the memory available to the Java heap to " "512MB. You can override that with the JVM_XMX environment " "variable." -msgstr "" +msgstr "بشكل افتراضي تُحِد الـ image الذاكرة المتاحة لـ Java heap لـ 512MB. تستطيع تغيير ذلك مع متغير البيئة JVM_XMX." #: i2p2www/pages/downloads/docker.html:33 -#, fuzzy msgid "Ports" -msgstr "نقل" +msgstr "المنافذ" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." -msgstr "" +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." +msgstr "هناك عدة منافذ مكشوفة بواسطة الـ image. تستطيع الكشف عن المنافذ التي تريدها على حسب احتياجاتك." #: i2p2www/pages/downloads/docker.html:38 msgid "Port" -msgstr "" +msgstr "منفذ" #: i2p2www/pages/downloads/docker.html:39 -#, fuzzy msgid "Interface" -msgstr "الأداء" +msgstr "واجهة المستخدم" #: i2p2www/pages/downloads/docker.html:40 msgid "Description" -msgstr "" +msgstr "الوصف" #: i2p2www/pages/downloads/docker.html:41 msgid "TCP/UDP" -msgstr "" +msgstr "TCP/UDP" #: i2p2www/pages/downloads/docker.html:48 msgid "HTTP Proxy" -msgstr "" +msgstr "وسيط HTTP" #: i2p2www/pages/downloads/docker.html:49 #: i2p2www/pages/downloads/docker.html:55 @@ -741,170 +677,153 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:97 #: i2p2www/pages/downloads/docker.html:103 msgid "TCP" -msgstr "" +msgstr "TCP" #: i2p2www/pages/downloads/docker.html:54 msgid "HTTPS Proxy" -msgstr "" +msgstr "وسيط HTTPS" #: i2p2www/pages/downloads/docker.html:60 msgid "IRC Proxy" -msgstr "" +msgstr "وسيط IRC" #: i2p2www/pages/downloads/docker.html:66 msgid "I2CP Protocol" -msgstr "" +msgstr "بروتوكول I2CP" #: i2p2www/pages/downloads/docker.html:72 msgid "SAM Bridge TCP" -msgstr "" +msgstr "جسر SAM TCP" #: i2p2www/pages/downloads/docker.html:78 msgid "Router console" -msgstr "" +msgstr "مركز تحكم الموجه" #: i2p2www/pages/downloads/docker.html:84 msgid "I2P Site" -msgstr "" +msgstr "موقع I2P" #: i2p2www/pages/downloads/docker.html:90 msgid "SMTP Proxy" -msgstr "" +msgstr "وسيط SMTP" #: i2p2www/pages/downloads/docker.html:96 msgid "POP3 Proxy" -msgstr "" +msgstr "وسيط POP3" #: i2p2www/pages/downloads/docker.html:101 #: i2p2www/pages/downloads/docker.html:107 msgid "LAN interface" -msgstr "" +msgstr "واجهة الشبكة المحلية" #: i2p2www/pages/downloads/docker.html:102 #: i2p2www/pages/downloads/docker.html:108 msgid "UPnP" -msgstr "" +msgstr "UPnP" #: i2p2www/pages/downloads/docker.html:109 msgid "UDP" -msgstr "" +msgstr "UDP" #: i2p2www/pages/downloads/docker.html:114 msgid "I2NP Protocol" -msgstr "" +msgstr "بروتوكول I2NP" #: i2p2www/pages/downloads/docker.html:115 msgid "TCP and UDP" -msgstr "" +msgstr "TCP و UDP" #: i2p2www/pages/downloads/docker.html:119 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." -msgstr "" +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." +msgstr "ربما تريد فقط لوحة تحكم الموجه (7657) ووسيط HTTP أي (4444). إذا أردت من I2P أن يكون قادرًا على استقبال اتصالات من الإنترنت، وبذلك فلا يجب أن يكون محمي بجدار، اكشف عن منفذ بروتوكول I2NP أي (12345) - ولكن تأكد من الكشف عنه على منفذ متخلف، وإلا سيستطيع البعض تخمين أنك تشغل I2P في Docker image." #: i2p2www/pages/downloads/docker.html:120 msgid "Networking" -msgstr "" +msgstr "توصيل الشبكات" #: i2p2www/pages/downloads/docker.html:121 msgid "" "A best-practices guide for cloud deployments is beyond the scope of this " -"document, but in general you should try to minimize the number of " -"published ports, while exposing only the I2NP ports to the internet. " -"That means that the services in the list above which are bound to " -"127.0.0.1 (which include the router console) will need to be accessed via" -" other methods like ssh tunneling or be manually configured to bind to a " -"different interface." -msgstr "" +"document, but in general you should try to minimize the number of published " +"ports, while exposing only the I2NP ports to the internet. That means that " +"the services in the list above which are bound to 127.0.0.1 (which include " +"the router console) will need to be accessed via other methods like ssh " +"tunneling or be manually configured to bind to a different interface." +msgstr "دليل على أفضل الممارسات لعمليات النشر السحابية هو موضوع خارج سياقنا هذا، ولكن عامةً يجب عليك أن تقلل أعداد المنافذ المكشوفة قدر المستطاع، ولكن بالكشف فقط عن منافذ I2NP إلى الإنترنت. هذا يعني أن الخدمات المدرجة في القائمة أعلاه المربوطين بـ 127.0.0.1 (من ضمنهم لوحة تحكم الموجه) يجب الوصول إليهم عبر طرق أخرى مثل تنفيق ssh أو عبر تهيئة يدوية لربطهم بواجهة أخرى." #: i2p2www/pages/downloads/docker.html:122 -#, fuzzy msgid "Example" -msgstr "الأشخاص" +msgstr "مثال" #: i2p2www/pages/downloads/docker.html:123 msgid "" "Here is an example container that mounts i2phome as home " -"directory, i2ptorrents for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." -msgstr "" +"directory, i2ptorrents for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." +msgstr "هنا مثال حاوية يُركب i2phome كالمجلد الرئيسي، i2ptorrents للتورينت، ويكشف عن وسيط HTTP، IRC، لوحة تحكم الموجه، وبروتوكولات I2NNP. يحد أيضًا من الذاكرة المتاحة لـ JVM لـ 256MB." #: i2p2www/pages/downloads/easyinstall.html:6 #: i2p2www/pages/downloads/firefox.html:6 msgid "I2P Easy Install Bundle (Beta) for Windows" -msgstr "" +msgstr "حزمة تثبيت I2P سهلة (بيتا) لللويندوز" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit The " -"Firefox\n" +"comes bundled with this installer, visit The Firefox\n" "Profile Page." -msgstr "" +msgstr "هذا المثبت \"الكل في واحد\" لويندوز 10 يحتوي على برمجيات I2P وتبعياته في حزمة واحدة سهلة التثبيت. مبني على فرضية أن استخدام I2P يجب أن يكون سهلًا، وأنه يجب علينا مساعدة المستخدمين بالتهيئة الأولية بدلًا من إعطائهم عملية تثبيت معقدة. للقراءة أكثر عن الملف الشخصي لفيرفكس المُحزم مع المثبت، زر صفحة الملف الشخصي لفيرفكس." #: i2p2www/pages/downloads/easyinstall.html:16 msgid "What do I need to use it?" -msgstr "" +msgstr "لماذا أحتاج استخدامه؟" #: i2p2www/pages/downloads/easyinstall.html:17 msgid "Just Firefox (Or Tor Browser)." -msgstr "" +msgstr "فقط فيرفكس (أو متصفح تور)." #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "Gitlab Issue. This is a Windows-only\n" "product." -msgstr "" +msgstr "يتطلب المثبت من أن يكون فيرفكس مثبتًا في النظام، لا يأتي مع متصفح فيفركس لوحده. رجاءً ثبت متصفح فيرفكس، أو متصفح تور. إذا أردت المناقشة عن متصفحات أخرى، فشارك المناقشة في مشكلة غيتلاب هذه. هذا منتج للويندوز فقط." #: i2p2www/pages/downloads/easyinstall.html:27 #: i2p2www/pages/downloads/firefox.html:23 i2p2www/pages/downloads/mac.html:28 msgid "Why should I use it?" -msgstr "" +msgstr "لماذا يجب علي استخدامه؟" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." -msgstr "" +msgstr "حزمة المثبت ستقلل من الخطوات المطلوبة لتثبيت موجه I2P على الويندوز من 30 خطوة إلى عملية تثبيت واحدة مألوفة، بجمع تثبيت I2P وتهيئة المتصفح إلى نفس الخطوات. بجانب ذلك، بعد التثبيت سيُشغل متصفح I2P المهيء تلقائيًا مع برامجه جاهزة للعمل، من دون الحاجة لتغيير أي إعدادات على مستوى النظام. الـ I2P الذي يسخدمه المثبت هو نفسه الـ I2P \"العادي\"." #: i2p2www/pages/downloads/easyinstall.html:37 #: i2p2www/pages/downloads/firefox.html:34 i2p2www/pages/downloads/mac.html:12 -#, fuzzy msgid "How do I use it?" -msgstr "كيف يعمل؟" +msgstr "كيف أستخدمه؟" #: i2p2www/pages/downloads/easyinstall.html:38 #: i2p2www/pages/downloads/firefox.html:35 @@ -913,46 +832,39 @@ msgid "" "First, download and install Firefox, then,\n" "just download and install this installer(below). To\n" "start an installer, \"double-click\" the downloaded .exe file." -msgstr "" +msgstr "حمل وثبت فيرفكس أولًا، بعدها حمل وثبت المثبت (أدناه)." #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." -msgstr "" +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." +msgstr "تشغيل المثبت سيُنشئ أيقونة اختصار لبدأ I2P في قائمة التطبيقات وعلى سطح المكتب. ضغط هذا الاختصار سيُشغل I2P إذا لم يكن مُشغلًا من قبل، ومن ثم سيُشغل متصفح I2P المهيء. على أول تشغيل ستكون هناك نافذة معالجة السعة الترددية. سترى أيضًا أيقونة \"توبي\" في شريط المهام للإشارة أن I2P يعمل في الخلفية." #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." -msgstr "" +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." +msgstr "يستخدم تصفح I2P ملف شخصي في فيرفكس لـ I2P فقط، لكي لا يتداخل مع تصفحك العادي. حتى أنك لا تحتاج إلى إغلاق نوافذ فيرفكس المفتوحة من قبل." #: i2p2www/pages/downloads/easyinstall.html:65 #: i2p2www/pages/downloads/firefox.html:50 i2p2www/pages/downloads/mac.html:51 #: i2p2www/pages/downloads/mac.html:67 msgid "Mirror:" -msgstr "" +msgstr "مرآة:" #: i2p2www/pages/downloads/easyinstall.html:67 #: i2p2www/pages/downloads/firefox.html:52 i2p2www/pages/downloads/mac.html:53 #: i2p2www/pages/downloads/mac.html:69 msgid "select alternate mirror" -msgstr "" +msgstr "تحديد مرآة بديلة" #: i2p2www/pages/downloads/easyinstall.html:74 msgid "Download that file and complete the steps it shows." -msgstr "" +msgstr "حمل هذا الملف وأكمل الخطوات الذي يريه لك." #: i2p2www/pages/downloads/easyinstall.html:79 #: i2p2www/pages/downloads/firefox.html:64 @@ -961,65 +873,55 @@ msgstr "" msgid "" "The files are signed by %(signer)s,\n" "whose key is here." -msgstr "" +msgstr "الملفات موقعة بواسطة %(signer)s، الذي مفتاحه هنا." #: i2p2www/pages/downloads/easyinstall.html:85 #: i2p2www/pages/downloads/firefox.html:70 -#, fuzzy msgid "What is in it?" -msgstr "ما هو I2P ؟" +msgstr "ما بداخله؟" #: i2p2www/pages/downloads/easyinstall.html:86 #: i2p2www/pages/downloads/firefox.html:71 msgid "A Jpackaged I2P Router:" -msgstr "" +msgstr "موجه I2P Jpackaged:" #: i2p2www/pages/downloads/easyinstall.html:88 #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." -msgstr "" +msgstr "موجه الـ I2P هو \"Jpackaged\" والذي يعني أنه يحتوي على كل مكونات الجافا المطلوبة تشغيله بنجاح. لن يحتاج إلى تثبيت جافا بشكل منفصل، لأنه يأتي مع مشغل جافا 16 الذي يُستخدم فقط لـ I2P." #: i2p2www/pages/downloads/easyinstall.html:93 #: i2p2www/pages/downloads/firefox.html:78 msgid "Browser Extensions:" -msgstr "" +msgstr "إضافات متصفح:" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." -msgstr "" +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." +msgstr "يتضمن الملف الشخصي أيضًا كلا من إضافة NoScript و HTTPSEverywhere لحماية أفضل ضد الهجمات المعتمدة على جافاسكريبت ودعم HTTPS أينما كان متاح.\nيفصل أيضًا تصفحك العادي على الإنترنت من تصفحك على I2P.\nالملف الشخصي يهيئ وسيط I2P لكل المواقع وخصائص المتصفح.\nيُستخدم I2P في التصفح الخفي من أجل إعطاء تكامل I2P مخصص." #: i2p2www/pages/downloads/easyinstall.html:101 -#: i2p2www/pages/downloads/firefox.html:86 i2p2www/pages/downloads/mac.html:105 +#: i2p2www/pages/downloads/firefox.html:86 +#: i2p2www/pages/downloads/mac.html:105 msgid "Source Code and Issue Tracking" -msgstr "" +msgstr "كود المصدر وتتبع المشاكل" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the i2p.firefox " -"project." -msgstr "" +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the i2p.firefox project." +msgstr "إذا أردت تفحص كود المصدر لكل مكون على حدى، فتستطيع العثور عليه على i2pgit.org أو github.com. الرخصة يكل مكون يمكن العثور عليها في مجلد الرخص في مشروع i2p.firefox." #: i2p2www/pages/downloads/easyinstall.html:107 #: i2p2www/pages/downloads/easyinstall.html:117 @@ -1027,125 +929,97 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:102 #: i2p2www/pages/downloads/mac.html:110 i2p2www/pages/downloads/mac.html:117 msgid "Gitlab Repository" -msgstr "" +msgstr "مستودع غيتلاب" #: i2p2www/pages/downloads/easyinstall.html:108 #: i2p2www/pages/downloads/firefox.html:93 msgid "Github Repository" -msgstr "" +msgstr "مستودع غيتهاب" #: i2p2www/pages/downloads/easyinstall.html:109 #: i2p2www/pages/downloads/firefox.html:94 msgid "Gitlab Repository for Profile Manager" -msgstr "" +msgstr "مستودع غيتلاب لمدير الملف الشخصي" #: i2p2www/pages/downloads/easyinstall.html:110 #: i2p2www/pages/downloads/firefox.html:95 msgid "Github Repository Profile Manager" -msgstr "" +msgstr "مستودع غيتهاب لمدير الملف الشخصي" #: i2p2www/pages/downloads/easyinstall.html:111 #: i2p2www/pages/downloads/firefox.html:96 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." -msgstr "" +msgstr "إذا أردت الإبلاغ عن مشكلة متعلقة بالملف الشخصي لفيرفكس، فاستخدم غيتلاب للتواصل معنا. لأي مشاكل متعلقة بالأمان، فصحح على خيار \"This issue is confidential and should only be visible to team members with at least Reporter access\" عند كتابة المشكلة." #: i2p2www/pages/downloads/easyinstall.html:118 #: i2p2www/pages/downloads/firefox.html:103 msgid "How is it different from Tor Browser?" -msgstr "" +msgstr "كيف هذا مختلف عن متصفح تور؟" #: i2p2www/pages/downloads/easyinstall.html:119 #: i2p2www/pages/downloads/firefox.html:104 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." -msgstr "" +msgstr "هذا ليس بتفريع من فيفركس. بدلًا من ذلك، فهو ملف شخصي للمتصفح بإعدادات مهيأة مسبقًا، مجموعة مع موجه I2P وبعض النصوص الآلية. ما يعني ذلك أن ستحتاج إلى تثبيت فيرفكس (أو متصفح تور) لكي تستطيع اتخدامه. لأجل أسباب أمنية، من المهم أن تحصل على تحديثات متينة من جهة موثوق منها." #: i2p2www/pages/downloads/easyinstall.html:126 #: i2p2www/pages/downloads/firefox.html:111 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." -msgstr "" +msgstr "صممت موجهات I2P لأن تشتغل لفترات طويلة، وعلى عكس متصفح تور، فعمر موجه I2P لا علاقة له بعمر جلسة تصفحك. الملف الشخصي للمتصفح ليدير سجلك، المخبأ والتحزين، وسياق تصفحك لن يوقف موجه I2P لوحده. تستطيع إيقاف الموجه في صفحة لوحة تحكم الموجه الرئيسية." #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit The Easy Install Bundle Page." -msgstr "" +msgstr "تم توسيع الملف الشخصي I2P لفيرفكس لأن يكون داخل حزمة تثبيت I2P السهلة. إذا كان لديك موجه I2P مثبت، فما زال بإمكانك استخدام هذا المثبت لتهيئة متصفح الـ I2P لديك. لن تُلمس إعداداتك لـ I2P. إذا لم يكن لديك موجه I2P مثبتًا، فليس هناك الحاجة لتنزيل I2P. هذه الحزمة ستنزل I2P في نفس الوقت مع الملف الشخصي للمتصفح. أُبقي على هذه الصفحة لتوثيق الحوافز والتصميم للملف الشخصي لفرفكس. للقراءة أكثر عن الحزمة الجديدة، زُر صفحة حزمة التثبيت السهلة." #: i2p2www/pages/downloads/firefox.html:17 msgid "I2P Firefox Browser Profile" -msgstr "" +msgstr "الملف الشخصي I2P لفيرفكس" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." -msgstr "" +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." +msgstr "بانضمامك الآن إلى شبكة I2P، ستريد زيارة مواقع I2P ومحتوى آخر مستضاف على الشبكة. الملف الشخصي لفيرفكس هو مهيئ للسماح لك باستخدام المحتوى الموجود على الشبكة." #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" #: i2p2www/pages/downloads/firefox.html:59 msgid "Download that file and run it." -msgstr "" +msgstr "حمل ذلك الملف وشغله" #: i2p2www/pages/downloads/list.html:1 i2p2www/pages/downloads/select.html:15 #: i2p2www/pages/global/nav.html:3 @@ -1154,27 +1028,26 @@ msgstr "تحميل" #: i2p2www/pages/downloads/list.html:9 msgid "Source package" -msgstr "" +msgstr "مصدر الحزمة" #: i2p2www/pages/downloads/list.html:10 i2p2www/pages/downloads/list.html:131 msgid "Automatic updates" -msgstr "" +msgstr "تحديثات تلقائية" #: i2p2www/pages/downloads/list.html:11 msgid "Manual updates" -msgstr "" +msgstr "تحديثات يدوية" #: i2p2www/pages/downloads/list.html:14 msgid "Lab" -msgstr "" +msgstr "المختبر" #: i2p2www/pages/downloads/list.html:15 #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"I2P Lab\n" -msgstr "" +"If you would like to try the latest experimental I2P projects, visit the I2P Lab\n" +msgstr "\nإذا أحببت تجربة حزم مشروع I2P التجريبية، زُر مختبر I2P\n" #: i2p2www/pages/downloads/list.html:19 i2p2www/pages/downloads/list.html:22 msgid "Release Notes" @@ -1186,221 +1059,192 @@ msgstr "سجل التغييرات" #: i2p2www/pages/downloads/list.html:28 msgid "Debian Change Log" -msgstr "" +msgstr "سجل تغيرات دبيان" #: i2p2www/pages/downloads/list.html:31 msgid "Android Change Log" -msgstr "" +msgstr "سجل تغيرات أندرويد" #: i2p2www/pages/downloads/list.html:37 msgid "I2P for Windows" -msgstr "" +msgstr "I2P للويندوز" #: i2p2www/pages/downloads/list.html:39 #, python-format msgid "" -"The default I2P installer requires Java to be installed. You can obtain " -"it from Oracle or from your choice of Java " -"distribution. After installing Java, download the file and double-click\n" +"The default I2P installer requires Java to be installed. You can obtain it from Oracle or from your choice of Java distribution. After installing Java, download the file and double-click\n" " to run it." -msgstr "" +msgstr "مثبت I2P الافتراضي يتطلب تثبيت جافا أولًا. تستطيع الحصول عليها من أوراكل أو من اختيارك لتوزيعة الجافا. بعد تثبيت جافا، حمل الملف واضغط عليه لتشغيله." #: i2p2www/pages/downloads/list.html:41 msgid "Easy Install Bundle For Windows (Beta)" -msgstr "" +msgstr "حزمة التثبيت السهلة للنيودوز (بيتا)" #: i2p2www/pages/downloads/list.html:43 msgid "" -"It is now possible to install all I2P components using a single package " -"(No Java required). To try out the new installer, click " -"below. This bundle can also be used to configure a Firefox Profile. It " -"will not interfere\n" +"It is now possible to install all I2P components using a single package (No Java required). To try out the new installer, click below. This bundle can also be used to configure a Firefox Profile. It will not interfere\n" " with an existing I2P installation if one exists." -msgstr "" +msgstr "من الممكن الآن تنزيل كل مكونات I2P باستخدام حزمة واحدة (بدون الحاجة إلى جافا). جرب المثبت الجديد، اضغط أدناه. هذه الحزمة تُستخدم أيضًا لتهيئة الملف الشخصي لفيرفكس. لن تتداخل مع تثبيتة I2P موجودة إذا وجدت مسبقًا." #: i2p2www/pages/downloads/list.html:45 msgid "I2P Easy Install Bundle For Windows (Beta)" -msgstr "" +msgstr "حزمة تثبيت I2P سهلة للنيودوز (بيتا)" #: i2p2www/pages/downloads/list.html:47 msgid "Detailed Install Guide" -msgstr "" +msgstr "دليل تثبيت مفصل" #: i2p2www/pages/downloads/list.html:50 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." -msgstr "" +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." +msgstr "هنا دليل مفيد لكيفية تثبيت I2P على ويندوز باستخدام تثبيتة جافا منفصلة والمثبت الكلاسيكي." #: i2p2www/pages/downloads/list.html:54 i2p2www/pages/downloads/list.html:56 #: i2p2www/pages/downloads/list.html:60 msgid "I2P Easy Install Bundle for Mac OS X" -msgstr "" +msgstr "حزمة تثبيت I2P سهلة لـ Mac OS X" #: i2p2www/pages/downloads/list.html:57 msgid "" -"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard" -" \".dmg\" package type, which allows it to use Apple's built-in tools to " -"securely, reliably, and easily install the package. It does not require " -"Java to be installed." -msgstr "" +"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard " +"\".dmg\" package type, which allows it to use Apple's built-in tools to " +"securely, reliably, and easily install the package. It does not require Java" +" to be installed." +msgstr "حزمة تثبيت I2P السهلة لـ Mac OS X هي محزومة بصيغة الحزم المعيارية \".dmg\"، والتي تسمح لأدوات آبل المدمجة بأن تثبت الحزمة بكشل آمن، متين، وسهل أيضًا. لا تحتاج تثبيتة جافا منفصل لكي تُثبت." #: i2p2www/pages/downloads/list.html:64 msgid "I2P for Linux" -msgstr "" +msgstr "I2P للينكس" #: i2p2www/pages/downloads/list.html:66 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" java -jar i2pinstall_%(i2pversion)s.jar. This will " -"launch the GUI installer. Depending on how your computer is set up, you " -"may be able to start the installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file\n" -" or right-clicking the file and selecting "Open with " -"Java". Unfortunately, this behaviour is difficult to predict." -msgstr "" +"The most reliable way to launch the installer is from a terminal like this:\n" +" java -jar i2pinstall_%(i2pversion)s.jar. This will launch the GUI installer. Depending on how your computer is set up, you may be able to start the installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file\n" +" or right-clicking the file and selecting "Open with Java". Unfortunately, this behaviour is difficult to predict." +msgstr "أفضل طريقة لتشغيل المثبت هي من طرفية كالتالي: java -jar i2pinstall_%(i2pversion)s.jar, سيُشغل هذا مثبت رسومي. تستطيع تشغيل المثبت أيضًا بالضغط على ملف "i2pinstall_%(i2pversion)s.jar"\nأو بالضغط على يمين الفأرة وتحديد " افتح مع جافا". لسوء الحظ فتوقع السلوك هذا صعب." #: i2p2www/pages/downloads/list.html:70 msgid "Command line (headless) install:" -msgstr "" +msgstr "تثبيت من موجه الأوامر (لارأسي)" #: i2p2www/pages/downloads/list.html:71 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially useful for servers, containers, or certain virtual machines. " -"If you wish to use the installer without a GUI, you can use the command\n" -" java -jar i2pinstall_%(i2pversion)s.jar -console to " -"follow the install procedure in your terminal." -msgstr "" +"I2P can also be installed in a terminal environment, which may be especially useful for servers, containers, or certain virtual machines. If you wish to use the installer without a GUI, you can use the command\n" +" java -jar i2pinstall_%(i2pversion)s.jar -console to follow the install procedure in your terminal." +msgstr "تستطيع أيضًا تثبيت I2P باستخدام طريفة، والتي قد تكون مفيدة للخوادم، الحاويات، وأجهزة افتراضية أخرى لا تحتوي على واجهة مستخدم روسمية. شغل java -jar i2pinstall_%(i2pversion)s.jar -console. " #: i2p2www/pages/downloads/list.html:74 msgid "I2P for Debian and Ubuntu" -msgstr "" +msgstr "I2P لدبيان وأوبونتو" #: i2p2www/pages/downloads/list.html:77 msgid "Packages for Debian & Ubuntu are available." -msgstr "" +msgstr "هناك حزم متاحة لدبيان و أوبونتو" #: i2p2www/pages/downloads/list.html:79 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid. However, Debian Buster and Ubuntu " -"Bionic (LTS) distributions will have older I2P versions. If you are not " -"running Debian Sid or the\n" -" latest Ubuntu release, use our Debian repo or Launchpad PPA to " -"ensure you're running the latest I2P version." -msgstr "" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid. However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions. If you are not running Debian Sid or the\n" +" latest Ubuntu release, use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." +msgstr "يتوفر I2P في مستودعات Ubuntu Bionic وما بعده، و Debian Buster و Sid. ولكن إصدارات Debian Buster و Ubuntu Bionic (LTS) سيحتووا على إصدارات I2P قديمة. إذا كنت لا تشغل Debian Sid أو آخر إصدار من أوبونتو، فاستخدم مستودعنا دبيان أو الـ Launchpad PPA لدينا للضمان من أنك تشغل آخر إصدار I2P." #: i2p2www/pages/downloads/list.html:83 msgid "I2P for Android" -msgstr "" +msgstr "I2P للأندرويد" #: i2p2www/pages/downloads/list.html:86 msgid "" "Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed I2P, unfortunately this release fixes some IPC issues which " -"will force you to uninstall your current installation before installing " -"this." -msgstr "" +"installed I2P, unfortunately this release fixes some IPC issues which will " +"force you to uninstall your current installation before installing this." +msgstr "يتطلب أندريود 4.0 (سندويشة الآيس كريم) أو أعلى." #: i2p2www/pages/downloads/list.html:86 msgid "512 MB RAM minimum; 1 GB recommended." -msgstr "" +msgstr "512MB حد أدنى للذاكرة العشوائية؛ يوصى بـ 1GB" #: i2p2www/pages/downloads/list.html:87 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them completely before installing any other " -"version. The apk's from download.i2p2.de\n" +"The releases are not compatible with eachother, as they have different signatures. Uninstall them completely before installing any other version. The apk's from download.i2p2.de\n" " are signed by idk." -msgstr "" +msgstr "الإصدارات فوق غير متطابقين مع بعضهم البعض، لديهم توقيعات مختلفة. ألغ تثبيت الأولى إذا ما أردت تنزيل الأخرى. ملفات الـ APK من download.i2p2.de هي موقعة من idk." #: i2p2www/pages/downloads/list.html:92 msgid "I2P for Docker" -msgstr "" +msgstr "I2P لدوكر" #: i2p2www/pages/downloads/list.html:102 msgid "" "I2P is now available as a Docker package from the Docker Hub. You may " "retrieve the image by running the 'docker pull' command." -msgstr "" +msgstr "أصبح I2P متاح كحزمة دوكر من Docker Hub. تستطيع جلب الـ image بتشغيل أمر 'docker pull'." #: i2p2www/pages/downloads/list.html:104 msgid "docker pull geti2p/i2p" -msgstr "" +msgstr "docker pull geti2p/i2p" #: i2p2www/pages/downloads/list.html:110 -msgid "Additional instructions for configuring your container can be found here." -msgstr "" +msgid "" +"Additional instructions for configuring your container can be found here." +msgstr "يمكن الحصول على خطوات إضافة لتهيئة الحاوية هنا." #: i2p2www/pages/downloads/list.html:113 #, python-format msgid "" "Alternately,\n" -" you can fetch the source via Git from git.repo.i2p or " -"Github.\n" -"
Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or" -" headless install as above." -msgstr "" +" you can fetch the source via Git from git.repo.i2p or Github.\n" +"
Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or headless install as above." +msgstr "تستطيع بدلًا من ذلك أن تجلب المصدر بواسطة غيت من git.repo.i2p أو غيت هاب.\nشغل (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg) ومن ثم إما شغل المثبت الرومي أو اللارأسي كما قلنا سابقًا." #: i2p2www/pages/downloads/list.html:116 #, python-format msgid "" -"Android source is also in git on Github. Android\n" -" builds require the I2P source. See the documentation in the " -"Android source for additional build requirements and instructions." -msgstr "" +"Android source is also in git on Github. Android\n" +" builds require the I2P source. See the documentation in the Android source for additional build requirements and instructions." +msgstr "مصدر الأندرويد متاح أيضًا في غيت على غيت هاب. بنية الأندرويد تتطلب مصدر I2P. انظر إلى التوثيق في مصدر الأندرويد من أجل تطلبات بنية وخطوات أكثر." #: i2p2www/pages/downloads/list.html:123 #, python-format msgid "" "The Windows installer is signed by %(signer)s,\n" "whose key is here." -msgstr "" +msgstr "مثبت الويندوز موقع من %(signer)s. الذي مفتاحه هنا." #: i2p2www/pages/downloads/list.html:124 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "whose key is here." -msgstr "" +msgstr "المثبت الأصيل لـ Mac OS X هو موقع من %(signer)s مع رخصة رقم هوية مطور آبل لديه. الذي مفتاحه هنا." #: i2p2www/pages/downloads/list.html:127 msgid "Updates from earlier releases:" -msgstr "" +msgstr "تحديثات من إصدارات قديمة:" #: i2p2www/pages/downloads/list.html:129 msgid "Both automatic and manual upgrades are available for the release." -msgstr "" +msgstr "كلا من التحديثات التلقائية واليدوية متوفرة للإصدارات." #: i2p2www/pages/downloads/list.html:132 msgid "" "If you are running 0.7.5 or later, your router should detect the new " -"release. To upgrade simply click the 'Download Update' button on your " -"router console when it appears." -msgstr "" +"release. To upgrade simply click the 'Download Update' button on your router" +" console when it appears." +msgstr "إذا كنت تشغل 0.7.5 أو ما بعد، فيجب على الموجه لديك الكشف عن إصدار جديد. للتحديث بكل بساطة اضغط على زر 'حمل التحديث' في لوحة تحكم الموجه لديك." #: i2p2www/pages/downloads/list.html:134 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router since 0.9.9. Routers older than 0.9.9 will fail to " -"verify update files signed by str4d, and will need to be manually updated" -" using the process below." -msgstr "" +"Since 0.9.23, some releases are signed by str4d, whose signing key has been " +"in the router since 0.9.9. Routers older than 0.9.9 will fail to verify " +"update files signed by str4d, and will need to be manually updated using the" +" process below." +msgstr "منذ 0.9.23، أصبحت الإصدارات موقعة من str4d، الذي كان مفتاح توقيعه في الموجه منذ 0.9.9. الموجهات التي هي أقدم من 0.9.9 ستفشل بعملية تحديث الملفات الموقعة من str4d، وستحتاج إلى تحديث يدوي باستخدام الطريقة أدناه." #: i2p2www/pages/downloads/list.html:140 msgid "" -"Download the file to your I2P installation directory and rename as " -"i2pupdate.zip. (alternately, you can get the source as above and run " -"\"ant updater\", then copy the resulting i2pupdate.zip to your I2P " -"installation directory).\n" +"Download the file to your I2P installation directory and rename as i2pupdate.zip. (alternately, you can get the source as above and run \"ant updater\", then copy the resulting i2pupdate.zip to your I2P installation directory).\n" " You do NOT need to unzip the file." msgstr "" @@ -1427,10 +1271,9 @@ msgstr "الاصدارات السابقة" #, python-format msgid "" "Previous releases are available on Google " -"Code and Launchpad " -"and within the I2P network on %(echelon)s." +"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code " +"and Launchpad and within the" +" I2P network on %(echelon)s." msgstr "" #: i2p2www/pages/downloads/mac.html:6 @@ -1439,66 +1282,49 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG-based bundle for Mac OS. It installs " -"and behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG-based bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" #: i2p2www/pages/downloads/mac.html:13 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:22 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on the browser configuration\n" "page." msgstr "" #: i2p2www/pages/downloads/mac.html:29 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" #: i2p2www/pages/downloads/mac.html:78 msgid "Instructions" -msgstr "" +msgstr "التعليمات" #: i2p2www/pages/downloads/mac.html:79 msgid "" -"Download the appropriate file for your Mac hardware and double-click on " -"it. Accept the License Agreement, then\n" -"drag the I2P icon on top of the Applications " -"icon.\n" +"Download the appropriate file for your Mac hardware and double-click on it. Accept the License Agreement, then\n" +"drag the I2P icon on top of the Applications icon.\n" "Launch I2P from Finder." msgstr "" @@ -1509,8 +1335,8 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:86 msgid "" "If you own an Apple silicon Mac and have previously installed the Intel " -"bundle on it you need to change the update configuration to make sure the" -" next I2P update does not revert your bundle to Intel." +"bundle on it you need to change the update configuration to make sure the " +"next I2P update does not revert your bundle to Intel." msgstr "" #: i2p2www/pages/downloads/mac.html:90 @@ -1523,22 +1349,18 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:99 msgid "Limitations" -msgstr "" +msgstr "القيود" #: i2p2www/pages/downloads/mac.html:100 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:106 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1546,46 +1368,36 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the router console,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the router console,\n" "which has further instructions." msgstr "" #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The router console\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The router console\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." msgstr "" #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" +"When installing for the first time, please remember to adjust your NAT/firewall\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "described here among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "configuration page." msgstr "" @@ -1627,12 +1439,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -1642,12 +1451,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." msgstr "" #: i2p2www/pages/downloads/windows.html:18 @@ -1680,10 +1486,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" msgstr "" @@ -1693,15 +1497,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" msgstr "" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." msgstr "" @@ -1711,15 +1513,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." msgstr "" #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." msgstr "" @@ -1744,7 +1544,8 @@ msgid "https://geti2p.net" msgstr "" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "" #: i2p2www/pages/downloads/windows.html:83 @@ -1753,22 +1554,19 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." msgstr "" #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." msgstr "" #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." msgstr "" @@ -1778,8 +1576,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." msgstr "" #: i2p2www/pages/downloads/windows.html:109 @@ -1788,18 +1586,15 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." msgstr "" #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." msgstr "" @@ -1829,10 +1624,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." msgstr "" #: i2p2www/pages/downloads/windows.html:147 @@ -1845,8 +1638,7 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." msgstr "" @@ -1865,22 +1657,20 @@ msgid "Here we have an overview of the applications." msgstr "" #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." msgstr "" #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the router console homepage to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the router console homepage to\n" "get started." msgstr "" @@ -1890,8 +1680,8 @@ msgstr "" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." msgstr "" #: i2p2www/pages/global/error_500.html:5 @@ -1937,36 +1727,36 @@ msgstr "شاركنا!" #: i2p2www/pages/global/footer.html:22 i2p2www/pages/global/nav.html:11 msgid "FAQ" -msgstr "أسئلة متكررة" +msgstr "الأسئلة الشائعة" #: i2p2www/pages/global/layout.html:35 msgid "Skip navigation" -msgstr "" +msgstr "تخطى التنقل" #: i2p2www/pages/global/layout.html:38 msgid "I2P Logo" -msgstr "" +msgstr "شعار I2P" #: i2p2www/pages/global/layout.html:38 i2p2www/pages/site/index.html:3 msgid "The Invisible Internet Project" -msgstr "" +msgstr "مشروع الإنترنت المخفي" #: i2p2www/pages/global/layout.html:80 #, python-format msgid "" "This page was last updated in %(lastupdated)s and is accurate for router " "version %(accuratefor)s." -msgstr "" +msgstr "آخر مرة حُدثت هذه الصفحة في %(lastupdated)s وهي صحيحة لإصدار الموجه %(accuratefor)s." #: i2p2www/pages/global/layout.html:84 #, python-format msgid "This page was last updated in %(lastupdated)s." -msgstr "" +msgstr "آخر مرة حُدثت هذه الصفحة في %(lastupdated)s." #: i2p2www/pages/global/layout.html:88 #, python-format msgid "This page is accurate for router version %(accuratefor)s." -msgstr "" +msgstr "الصفحة هذه صحيحة لإصدار الموجه %(accuratefor)s." #: i2p2www/pages/global/macros:26 msgid "Previous" @@ -1986,15 +1776,15 @@ msgstr "حول" #: i2p2www/pages/global/nav.html:6 msgid "Introduction to I2P" -msgstr "" +msgstr "مقدمة عن I2P" #: i2p2www/pages/global/nav.html:7 msgid "Guide to I2P Software" -msgstr "" +msgstr "دليل لبرمجيات I2P" #: i2p2www/pages/global/nav.html:9 msgid "What is Included" -msgstr "" +msgstr "ما هو مضمن" #: i2p2www/pages/global/nav.html:10 msgid "How to browse I2P" @@ -2002,27 +1792,27 @@ msgstr "كيف تتصفح I2P" #: i2p2www/pages/global/nav.html:12 i2p2www/pages/global/nav.html:165 msgid "Applications" -msgstr "" +msgstr "التطبيقات" #: i2p2www/pages/global/nav.html:14 msgid "Bittorrent" -msgstr "" +msgstr "بت تورنت" #: i2p2www/pages/global/nav.html:15 i2p2www/pages/global/nav.html:60 msgid "GitLab" -msgstr "" +msgstr "غيتلاب" #: i2p2www/pages/global/nav.html:16 i2p2www/pages/global/nav.html:53 msgid "Git" -msgstr "" +msgstr "غيت" #: i2p2www/pages/global/nav.html:17 msgid "git+Bittorrent" -msgstr "" +msgstr "غيت+بت تورنت" #: i2p2www/pages/global/nav.html:18 msgid "IRC" -msgstr "" +msgstr "IRC" #: i2p2www/pages/global/nav.html:23 msgid "Help" @@ -2038,67 +1828,67 @@ msgstr "الأداء" #: i2p2www/pages/global/nav.html:27 msgid "Comparisons" -msgstr "" +msgstr "مقارنات" #: i2p2www/pages/global/nav.html:32 msgid "Other anonymous networks" -msgstr "" +msgstr "شبكات مجهولة أخرى" #: i2p2www/pages/global/nav.html:35 msgid "Verify I2P" -msgstr "" +msgstr "تأكد من I2P" #: i2p2www/pages/global/nav.html:37 msgid "Release signing keys" -msgstr "" +msgstr "مفاتيح توقيع الإصدارات" #: i2p2www/pages/global/nav.html:38 msgid "Signed keys" -msgstr "" +msgstr "مفاتيح التوقيع" #: i2p2www/pages/global/nav.html:39 msgid "Developers keys" -msgstr "" +msgstr "مفاتيح المطورين" #: i2p2www/pages/global/nav.html:42 i2p2www/pages/global/nav.html:181 msgid "Contact us" -msgstr "اتصل بنا" +msgstr "تواصل معنا" #: i2p2www/pages/global/nav.html:45 msgid "Contributor Guides" -msgstr "" +msgstr "دليل المساهمين" #: i2p2www/pages/global/nav.html:48 msgid "Develop Software" -msgstr "" +msgstr "طور البرمجيات" #: i2p2www/pages/global/nav.html:50 msgid "New developers" -msgstr "مطور جديد" +msgstr "المطورون الجدد" #: i2p2www/pages/global/nav.html:51 msgid "Using an IDE with I2P" -msgstr "" +msgstr "استخدام IDE مع I2P" #: i2p2www/pages/global/nav.html:52 msgid "Developer guidelines and coding style" -msgstr "" +msgstr "إرشادات المطورين ونمط الكود" #: i2p2www/pages/global/nav.html:56 msgid "Translate I2P into more Languages" -msgstr "" +msgstr "ترجم I2P إلى لغات أكثر" #: i2p2www/pages/global/nav.html:57 msgid "Hosting Services" -msgstr "" +msgstr "خدمات الاستضافة" #: i2p2www/pages/global/nav.html:59 msgid "Reseed" -msgstr "اعادة توزيع" +msgstr "إعادة التوزيع" #: i2p2www/pages/global/nav.html:65 msgid "Contact and Team" -msgstr "" +msgstr "التواصل والفريق" #: i2p2www/pages/global/nav.html:67 msgid "Community" @@ -2118,19 +1908,19 @@ msgstr "أسئلة البحث المفتوحة" #: i2p2www/pages/global/nav.html:77 msgid "Vulnerability Response Process" -msgstr "" +msgstr "عملية الرد على نقاط الضعف" #: i2p2www/pages/global/nav.html:79 msgid "Academic papers and peer review" -msgstr "" +msgstr "الأوراق الأكاديمية ومراجعة الأقران" #: i2p2www/pages/global/nav.html:81 msgid "Presentations, tutorials and articles" -msgstr "" +msgstr "العروض، الدروس التعليمية، والمقالات" #: i2p2www/pages/global/nav.html:88 msgid "I2P Metrics" -msgstr "" +msgstr "مقاييس I2P" #: i2p2www/pages/global/nav.html:92 msgid "Develop" @@ -2138,7 +1928,7 @@ msgstr "تطوير" #: i2p2www/pages/global/nav.html:94 msgid "Gitlab" -msgstr "" +msgstr "غيت لاب" #: i2p2www/pages/global/nav.html:95 msgid "Docs" @@ -2146,7 +1936,7 @@ msgstr "التوثيق" #: i2p2www/pages/global/nav.html:97 msgid "Documentation index" -msgstr "" +msgstr "فهرس التوثيق" #: i2p2www/pages/global/nav.html:98 msgid "How does it work?" @@ -2154,11 +1944,11 @@ msgstr "كيف يعمل؟" #: i2p2www/pages/global/nav.html:100 msgid "Gentle intro" -msgstr "" +msgstr "مقدمة خفيفة" #: i2p2www/pages/global/nav.html:101 msgid "Tech intro" -msgstr "" +msgstr "مقدمة تقنية" #: i2p2www/pages/global/nav.html:102 msgid "Threat model" @@ -2166,7 +1956,7 @@ msgstr "نموذج التهديد" #: i2p2www/pages/global/nav.html:103 msgid "Garlic routing" -msgstr "" +msgstr "التوجيه الثومي" #: i2p2www/pages/global/nav.html:104 msgid "Network database" @@ -2174,7 +1964,7 @@ msgstr "قاعدة بيانات الشبكة" #: i2p2www/pages/global/nav.html:105 msgid "Tunnel routing" -msgstr "" +msgstr "توجيه الأنفاق" #: i2p2www/pages/global/nav.html:106 msgid "Peer selection" @@ -2186,15 +1976,15 @@ msgstr "التشفير" #: i2p2www/pages/global/nav.html:108 msgid "ElGamal/AES+SessionTags" -msgstr "" +msgstr "ElGamal/AES+SessionTags" #: i2p2www/pages/global/nav.html:111 msgid "Specifications" -msgstr "" +msgstr "المواصفات" #: i2p2www/pages/global/nav.html:112 msgid "Proposals" -msgstr "" +msgstr "الاقتراحات" #: i2p2www/pages/global/nav.html:113 i2p2www/pages/global/nav.html:152 msgid "API" @@ -2202,19 +1992,19 @@ msgstr "API" #: i2p2www/pages/global/nav.html:119 i2p2www/pages/global/nav.html:158 msgid "Streaming library" -msgstr "" +msgstr "مكتبة البث" #: i2p2www/pages/global/nav.html:120 i2p2www/pages/global/nav.html:159 msgid "Datagrams" -msgstr "" +msgstr "مخطط البيانات" #: i2p2www/pages/global/nav.html:124 msgid "Protocols" -msgstr "" +msgstr "البروتوكولات" #: i2p2www/pages/global/nav.html:126 msgid "Protocol stack" -msgstr "" +msgstr "رصَّة البروتوكولات" #: i2p2www/pages/global/nav.html:131 msgid "Transports" @@ -2222,7 +2012,7 @@ msgstr "نقل" #: i2p2www/pages/global/nav.html:133 msgid "Transport layer overview" -msgstr "" +msgstr "معاينة طبقة النقل" #: i2p2www/pages/global/nav.html:140 msgid "Tunnels" @@ -2230,7 +2020,7 @@ msgstr "نفق" #: i2p2www/pages/global/nav.html:142 msgid "Tunnel implementation" -msgstr "" +msgstr "تنفيذ النفق" #: i2p2www/pages/global/nav.html:143 msgid "Unidirectional tunnels" @@ -2238,11 +2028,11 @@ msgstr "اﻷنفاق أحاديّة الاتجاه" #: i2p2www/pages/global/nav.html:144 msgid "Old implementation" -msgstr "" +msgstr "التنفيذ القديم" #: i2p2www/pages/global/nav.html:147 msgid "Naming and Address Book" -msgstr "" +msgstr "التسمية وكتاب العناوين" #: i2p2www/pages/global/nav.html:148 msgid "Plugins" @@ -2250,7 +2040,7 @@ msgstr "الاضافات" #: i2p2www/pages/global/nav.html:149 msgid "Strict Countries" -msgstr "" +msgstr "الدول الصارمة" #: i2p2www/pages/global/nav.html:163 msgid "License" @@ -2262,15 +2052,15 @@ msgstr "الرخص" #: i2p2www/pages/global/nav.html:169 msgid "Meetings, Roadmap" -msgstr "" +msgstr "الاجتماعات، خريطة المشروع" #: i2p2www/pages/global/nav.html:171 msgid "Meeting Logs" -msgstr "" +msgstr "سجل الاجتماعات" #: i2p2www/pages/global/nav.html:172 msgid "Project Roadmap" -msgstr "" +msgstr "خريطة المشروع" #: i2p2www/pages/global/nav.html:173 msgid "Task list" @@ -2278,7 +2068,7 @@ msgstr "قائمة المهام" #: i2p2www/pages/global/nav.html:176 msgid "Bug tracker" -msgstr "" +msgstr "متتبع الأخطاء" #: i2p2www/pages/global/nav.html:179 msgid "People" @@ -2290,39 +2080,36 @@ msgstr "اللغة" #: i2p2www/pages/meetings/index.html:2 msgid "Logs of past I2P meetings" -msgstr "" +msgstr "سجل اجتماعات I2P الماضية" #: i2p2www/pages/meetings/index.html:4 msgid "I2P Meetings ATOM Feed" -msgstr "" +msgstr "تقليمات أتوم لاجتماعات I2P" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "the meetings forum." -msgstr "" +msgstr "بشكل انتظامي تُعقد اجتماعات المشروع أول ثلاثاء بداية كل شهر الساعة 8 PM UTC.\nأي شخص يستطيع أن يجدول ويشغل اجتماعًا، بنشر جدوله على منتدى الاجتماعات." #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"Status updates from developers are also " -"available." -msgstr "" +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"Status updates from developers are also available." +msgstr "إذا كان لديك شيئًا ما لمناقشته، فتستطيع العثور على المطورين على IRC في #i2p-dev.\nتحديثات الحالة من المطورين متوفرة أيضًا." #: i2p2www/pages/meetings/show.html:2 #, python-format msgid "I2P Development Meeting %(id)s" -msgstr "" +msgstr "اجتماع تطوير I2P %(id)s" #: i2p2www/pages/meetings/show.html:10 msgid "Full IRC Log" -msgstr "" +msgstr "سجل IRC الكامل" #: i2p2www/pages/papers/list.html:28 msgid "By topic" @@ -2345,43 +2132,43 @@ msgid "" "BibTeX source page for examples.
\n" "Remember to include URLs if possible:\n" "offline papers are less useful." -msgstr "" +msgstr "ابعث مدخل جديد أو مُصحح إلى %(email)s.\n
إذا استطعت، فهيّئهم كـ BibTeX؛ انظر إلى صفحتنا لمصدر BibTeX لأمثلة.\n
\nتذكر من إضافة عناوين إذا كان ممكنًا: الأوراق الغير متصل على الإنترنت هي أقل فائدة.." #: i2p2www/pages/papers/list.html:80 #, python-format msgid "" "The source code for this page was adapted from\n" "Free Haven's anonymity bibliography." -msgstr "" +msgstr "كود مصدر هذه الصفحة اقتُبس من Free Haven's anonymity bibliography." #: i2p2www/pages/site/contact.html:4 msgid "Email" -msgstr "البريد الالكتروني" +msgstr "البريد الإلكتروني" #: i2p2www/pages/site/contact.html:5 msgid "" "Please do not use these email addresses for support requests.\n" "For contact specific to research, outreach and security please use:" -msgstr "" +msgstr "لا تستخدم هذه عنوان البريد هذه لطلبات الدعم.\nللتواصل بشأن بحث معين، تواصل خارجي وأمان فاستخدم:" #: i2p2www/pages/site/contact.html:24 msgid "Please visit our I2P user forum -" -msgstr "" +msgstr "زُر منتدى الـ I2P لمستخدمينا - " #: i2p2www/pages/site/contact.html:24 msgid "" "available on non-private internet at https://i2pforum.net and on I2P at " "http://i2pforum.i2p" -msgstr "" +msgstr "متوفر على الإنترنت غير الخصوصي على https://i2pforum.net وعلى I2P على http://i2pforum.i2p" #: i2p2www/pages/site/contact.html:26 #, python-format msgid "" "Most of the discussion about I2P's development happens on the I2P developer forum (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." -msgstr "" +"href=\"http://%(zzz)s\">I2P developer forum (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." +msgstr "أغلب المناقشة التي عن تطوير I2P تحدث على منتدى I2P للمطورين (يمكن الوصول إليه فقط من شبكة I2P). عادةً ما يكون هذا أفضل مكان لبدأ استفسارات، إذا كانت قناة IRC للمطورين غير نشطة." #: i2p2www/pages/site/contact.html:30 msgid "Social Media" @@ -2390,25 +2177,18 @@ msgstr "التواصل الإجتماعي" #: i2p2www/pages/site/contact.html:32 msgid "" "" -msgstr "" +msgstr "" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like OFTC,\n" -" EIN and Freenode.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like OFTC,\n" +" EIN and Freenode.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." msgstr "" #: i2p2www/pages/site/contact.html:49 @@ -2450,13 +2230,13 @@ msgstr "" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" msgstr "" #: i2p2www/pages/site/contact.html:80 msgid "Team" -msgstr "فريق" +msgstr "الفريق" #: i2p2www/pages/site/contact.html:83 msgid "Admin" @@ -2464,7 +2244,7 @@ msgstr "المدير" #: i2p2www/pages/site/contact.html:84 msgid "Project Manager" -msgstr "" +msgstr "مدير المشاريع" #: i2p2www/pages/site/contact.html:86 msgid "point of contact of last resort" @@ -2497,7 +2277,7 @@ msgstr "" #: i2p2www/pages/site/contact.html:104 #, python-format msgid "Forum admin" -msgstr "" +msgstr "المنتدى المدير" #: i2p2www/pages/site/contact.html:106 msgid "manage the public user forum" @@ -2584,7 +2364,7 @@ msgstr "" #: i2p2www/pages/site/contact.html:154 msgid "Reseed admin" -msgstr "" +msgstr "مدير إعادة التوزيع" #: i2p2www/pages/site/contact.html:156 msgid "Monitors, advises and recruits reseed hosts" @@ -2623,7 +2403,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/contact.html:189 @@ -2874,7 +2655,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/contact.html:397 @@ -2927,25 +2709,20 @@ msgstr "" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.
\n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.
\n" "We disgrace hate, anger, racism, and bad speaking towards anyone.
\n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.
\n" -"We work together to build a free world without hate, racism and " -"violence.
\n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.
\n" +"We work together to build a free world without hate, racism and violence.
\n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." msgstr "" #: i2p2www/pages/site/faq.html:2 msgid "Frequently Asked Questions" -msgstr "الأسئلة المتكررة" +msgstr "الأسئلة الشائعة" #: i2p2www/pages/site/faq.html:6 msgid "I2P Router Help" -msgstr "مساعدة روتر I2P" +msgstr "مساعدة موجه I2P" #: i2p2www/pages/site/faq.html:8 i2p2www/pages/site/faq.html:68 msgid "What systems will I2P run on?" @@ -2957,8 +2734,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" msgstr "" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 @@ -2972,13 +2748,13 @@ msgstr "" #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" msgstr "" #: i2p2www/pages/site/faq.html:14 msgid "Is it possible to block I2P?" -msgstr "" +msgstr "هل من الإمكان حظر I2P؟" #: i2p2www/pages/site/faq.html:15 msgid "" @@ -2988,41 +2764,41 @@ msgstr "" #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189 msgid "Most of the I2P Sites within I2P are down?" -msgstr "" +msgstr "أغلب مواقع I2P في شبكة I2P لا تعمل؟" #: i2p2www/pages/site/faq.html:17 msgid "Why is I2P listening for connections on port 32000?" -msgstr "" +msgstr "لماذا يستمع I2P لاتصالات عبر المنفذ 32000؟" #: i2p2www/pages/site/faq.html:21 i2p2www/pages/site/faq.html:213 msgid "How do I configure my browser?" -msgstr "" +msgstr "كيف أهيِّئ متصفحي؟" #: i2p2www/pages/site/faq.html:22 i2p2www/pages/site/faq.html:221 msgid "How do I connect to IRC within I2P?" -msgstr "" +msgstr "كيف أتصل بـIRC من I2P؟" #: i2p2www/pages/site/faq.html:23 i2p2www/pages/site/faq.html:236 msgid "How do I set up my own I2P Site?" -msgstr "" +msgstr "كيف أُنشئ موقعي الـI2P الخاص؟" #: i2p2www/pages/site/faq.html:24 i2p2www/pages/site/faq.html:242 msgid "" "If I host a website at I2P at home, containing only HTML and CSS, is it " "dangerous?" -msgstr "" +msgstr "إذا استضفت موقع I2P في منزلي، يحتوي فقط على HTML و CSS، هل هذا بالخطر؟" #: i2p2www/pages/site/faq.html:25 msgid "How Does I2P find \".i2p\" websites?" -msgstr "" +msgstr "كيف يعثر I2P على مواقع \".i2p\"؟" #: i2p2www/pages/site/faq.html:26 msgid "How do I add to the Address Book?" -msgstr "" +msgstr "كيف أضيف إلى كتاب العناوين؟" #: i2p2www/pages/site/faq.html:27 i2p2www/pages/site/faq.html:259 msgid "What ports does I2P use?" -msgstr "" +msgstr "أي منافذ يستخدمها I2P؟" #: i2p2www/pages/site/faq.html:28 i2p2www/pages/site/faq.html:533 msgid "" @@ -3032,8 +2808,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" +"How can I access the web console from my other machines or password protect " +"it?" msgstr "" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 @@ -3042,17 +2818,16 @@ msgstr "" #: i2p2www/pages/site/faq.html:31 i2p2www/pages/site/faq.html:630 msgid "Is it possible to use I2P as a SOCKS proxy?" -msgstr "" +msgstr "هل من الممكن استعمال I2P كوسيط SOCKS؟ " #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" msgstr "" #: i2p2www/pages/site/faq.html:34 msgid "Reseeds" -msgstr "" +msgstr "معيدات التوزيع" #: i2p2www/pages/site/faq.html:36 i2p2www/pages/site/faq.html:755 msgid "" @@ -3062,11 +2837,11 @@ msgstr "" #: i2p2www/pages/site/faq.html:37 i2p2www/pages/site/faq.html:763 msgid "How do I reseed manually?" -msgstr "" +msgstr "كيف أعيد التوزيع يدويًا؟" #: i2p2www/pages/site/faq.html:39 msgid "Privacy-Safety" -msgstr "" +msgstr "الخصوصية-الأمان" #: i2p2www/pages/site/faq.html:41 msgid "" @@ -3080,12 +2855,12 @@ msgstr "" #: i2p2www/pages/site/faq.html:43 i2p2www/pages/site/faq.html:675 msgid "Is using I2P Safe?" -msgstr "" +msgstr "هل I2P آمن؟" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 @@ -3116,8 +2891,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" msgstr "" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 @@ -3131,41 +2906,31 @@ msgstr "عندي سؤال!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the Java programming language." -" \n" +"I2P is written in the Java programming language. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An Android port is also available." msgstr "" #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." msgstr "" #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the Raspberry Pi range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the Raspberry Pi range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." msgstr "" #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "%(chart)s.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." @@ -3174,48 +2939,33 @@ msgstr "" #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "alternative clients which don't require Java." msgstr "" #: i2p2www/pages/site/faq.html:101 msgid "What is an \"I2P Site?\"" -msgstr "" +msgstr "ما هو \"موقع I2P\"؟" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the browser configuration page." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the browser configuration page." msgstr "" #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." msgstr "" #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" msgstr "" @@ -3223,50 +2973,34 @@ msgstr "" #: i2p2www/pages/site/faq.html:129 msgid "" "Distribution
\n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route any traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route any traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." msgstr "" #: i2p2www/pages/site/faq.html:139 msgid "" "Storage
\n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, Freenet.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, Freenet.\n" "By running I2P, you are not storing content for anyone." msgstr "" #: i2p2www/pages/site/faq.html:147 msgid "" "Access
\n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." msgstr "" #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." msgstr "" #: i2p2www/pages/site/faq.html:161 @@ -3277,9 +3011,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" msgstr "" #: i2p2www/pages/site/faq.html:168 @@ -3294,8 +3028,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." msgstr "" #: i2p2www/pages/site/faq.html:177 @@ -3306,8 +3040,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:181 msgid "" -"WARNING: For any changes to wrapper.config " -"to take effect, you must completely\n" +"WARNING: For any changes to wrapper.config to take effect, you must completely\n" "stop the router and the wrapper. Clicking Restart on your\n" "router console will NOT reread this file! You must\n" "click Shutdown, wait 11 minutes, then start I2P." @@ -3316,11 +3049,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "%(eepstatus)s tracks active I2P Sites." msgstr "" @@ -3330,13 +3061,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." msgstr "" #: i2p2www/pages/site/faq.html:206 @@ -3349,47 +3076,32 @@ msgstr "" #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a separate page with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." +"The proxy config for different browsers is on a separate page with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." msgstr "" #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the I2PTunnel " -"configuration page), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to localhost " -"6668. \n" -"HexChat-like client users can create a new network with the server " -"localhost/6668 (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the I2PTunnel configuration page), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to localhost 6668. \n" +"HexChat-like client users can create a new network with the server localhost/6668 (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" msgstr "" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the Website link at the " -"top of your router console for instructions." +"Click on the Website link at the top " +"of your router console for instructions." msgstr "" #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." msgstr "" @@ -3403,23 +3115,23 @@ msgstr "" #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." msgstr "" #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." msgstr "" #: i2p2www/pages/site/faq.html:261 @@ -3442,12 +3154,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports
Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router configuration page." +"Internet-facing ports
Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router configuration page." msgstr "" #: i2p2www/pages/site/faq.html:278 @@ -3457,8 +3166,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the configuration page to " -"arbitrary remote UDP ports, allowing for replies" +"href=\"http://127.0.0.1:7657/confignet\">configuration page to arbitrary" +" remote UDP ports, allowing for replies" msgstr "" #: i2p2www/pages/site/faq.html:281 @@ -3468,9 +3177,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" msgstr "" #: i2p2www/pages/site/faq.html:285 @@ -3523,133 +3230,100 @@ msgstr "" #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on configclients. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on configclients. \n" " May be changed in the bob.config file." msgstr "" #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.HTTPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.HTTPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.SSDPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.SSDPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on configclients but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on configclients." +" May be changed to a different port on configclients but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on configclients." msgstr "" #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on configclients. \n" -" May be changed in the clients.config file with the" -" SAM command line option sam.udp.port=nnnn." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on configclients. \n" +" May be changed in the clients.config file with the SAM command line option sam.udp.port=nnnn." msgstr "" #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on configclients. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on configclients. \n" " May be changed in the clients.config file." msgstr "" #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the clients.configfile. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." +" May also be configured to be bound to a specific interface or all interfaces in that file." msgstr "" #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the clients.config file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the jetty.xml file." +" May also be configured to be bound to a specific interface or all interfaces in the jetty.xml file." msgstr "" #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." +" May also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the wrapper documentation. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the wrapper documentation. \n" +"To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." msgstr "" #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"outbound facing port, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the outbound facing port, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." msgstr "" @@ -3665,22 +3339,16 @@ msgstr "" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as http://website.i2p are references" -" to a long, random string known as a destination. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a SHA256 hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." +"Human-readable addresses such as http://website.i2p are references to a long, random string known as a destination. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a SHA256 hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." msgstr "" #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." msgstr "" #: i2p2www/pages/site/faq.html:545 @@ -3689,8 +3357,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." msgstr "" #: i2p2www/pages/site/faq.html:547 @@ -3710,8 +3378,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" msgstr "" @@ -3732,17 +3399,14 @@ msgstr "" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" msgstr "" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" msgstr "" #: i2p2www/pages/site/faq.html:593 @@ -3751,114 +3415,84 @@ msgstr "" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to http://localhost:7657/configui" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." +"Go to http://localhost:7657/configui and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." msgstr "" #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to http://localhost:7657/index and " -"hit \"Graceful restart\", \n" +"Go to http://localhost:7657/index and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" msgstr "" #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at http://(System_IP):7657 and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at http://(System_IP):7657 and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." msgstr "" #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." msgstr "" #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"http://localhost:7657/configi2cp" +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"http://localhost:7657/configi2cp" msgstr "" #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." msgstr "" #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." msgstr "" #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the socks page." msgstr "" #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" +"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" "as there are serious anonymity-related issues associated with doing so." msgstr "" #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." msgstr "" #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike Tor, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike Tor, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an outproxy guide available on our " -"forums, if you would like to learn more about running an outproxy." +"There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy." msgstr "" #: i2p2www/pages/site/faq.html:679 @@ -3868,157 +3502,118 @@ msgstr "" #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" msgstr "" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." msgstr "" #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." msgstr "" #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through Transport" -" Layer Security (TLS). \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." msgstr "" #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" +"For more information, you may read the Tor FAQ's answer to this question:\n" +"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" msgstr "" #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on %(zzz)s.\n" -"This discussion has been mirrored on our " -"forums as well." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on %(zzz)s.\n" +"This discussion has been mirrored on our forums as well." msgstr "" #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your threat model, and how much you " -"choose to trust the outproxy operator." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your threat model, and how much you choose to trust the outproxy operator." msgstr "" #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." msgstr "" #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." msgstr "" #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." msgstr "" #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the reseed instructions." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the reseed instructions." msgstr "" #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." msgstr "" #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." msgstr "" #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." msgstr "" @@ -4026,10 +3621,8 @@ msgstr "" #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to %(url)s and configure the proxy type, " -"hostname, and port." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to %(url)s and configure the proxy type, hostname, and port." msgstr "" #: i2p2www/pages/site/faq.html:789 @@ -4038,18 +3631,12 @@ msgstr "" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." msgstr "" @@ -4083,12 +3670,12 @@ msgstr "" #: i2p2www/pages/site/faq.html:811 msgid "Sharing a reseed file" -msgstr "" +msgstr "مشاركة ملف إعادة توزيع" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" msgstr "" #: i2p2www/pages/site/faq.html:815 @@ -4103,12 +3690,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." msgstr "" @@ -4118,12 +3702,13 @@ msgstr "" #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" msgstr "" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" msgstr "" #: i2p2www/pages/site/faq.html:830 @@ -4132,52 +3717,33 @@ msgstr "" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using Tor." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using Tor." msgstr "" #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." msgstr "" #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." msgstr "" #: i2p2www/pages/site/faq.html:876 @@ -4194,10 +3760,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"java -version at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing java -version at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." msgstr "" @@ -4207,8 +3771,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." msgstr "" @@ -4218,10 +3781,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for share bandwidth percentage on the " -"configuration page." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for share bandwidth percentage on the configuration page." msgstr "" #: i2p2www/pages/site/faq.html:901 @@ -4230,8 +3791,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." msgstr "" #: i2p2www/pages/site/faq.html:907 @@ -4240,12 +3801,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on the graphs page \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting wrapper.java.maxmemory in the file " -"wrapper.config." +"Has enough memory been set aside for use by I2P? Look at the memory graph on the graphs page \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting wrapper.java.maxmemory in the file wrapper.config." msgstr "" #: i2p2www/pages/site/faq.html:915 @@ -4255,23 +3813,19 @@ msgstr "" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." msgstr "" #: i2p2www/pages/site/faq.html:922 msgid "Java-related" -msgstr "" +msgstr "متعلف بجافا" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the jbigi page for instructions on " -"diagnosing, building, and testing methods." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the jbigi page for instructions on diagnosing, building, and testing methods." msgstr "" #: i2p2www/pages/site/faq.html:929 @@ -4280,198 +3834,144 @@ msgstr "الأنفاق المشاركة" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the confignet page,\n" -"or by setting router.maxParticipatingTunnels=nnn on the configadvanced " -"page." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the confignet page,\n" +"or by setting router.maxParticipatingTunnels=nnn on the configadvanced page." msgstr "" #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" http://localhost:7657/config" +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" http://localhost:7657/config" msgstr "" #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." msgstr "" #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" msgstr "" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." msgstr "" #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." msgstr "" #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." msgstr "" #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" msgstr "" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." msgstr "" #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." msgstr "" #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the http://localhost:7657/config " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the http://localhost:7657/config page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." msgstr "" #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." msgstr "" #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, install the latest " -"release." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, install the latest release." msgstr "" #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." msgstr "" #: i2p2www/pages/site/faq.html:1044 msgid "Our Bugtracker:" -msgstr "" +msgstr "متتبع الأخطاء:" #: i2p2www/pages/site/faq.html:1046 msgid "Non-private internet:" -msgstr "" +msgstr "الإنترنت غير الخصوصي:" #: i2p2www/pages/site/faq.html:1047 msgid "On I2P:" -msgstr "" +msgstr "على I2P:" #: i2p2www/pages/site/faq.html:1049 msgid "Our forums:" -msgstr "" +msgstr "منتدياتنا:" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" PrivateBin Wiki, or an I2P paste service such as this \n" -" PrivateBin instance or this" -" \n" -" Javascript-free paste service and" -" follow up on IRC in #i2p<" +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" PrivateBin Wiki, or an I2P paste service such as this \n" +" PrivateBin instance or this \n" +" Javascript-free paste service and follow up on IRC in #i2p<" msgstr "" #: i2p2www/pages/site/faq.html:1054 msgid "Join #i2p-dev Discuss with the developers on IRC" -msgstr "" +msgstr "انضم إلى المناقشة #i2p-dev مع المطورين على IRC" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "http://127.0.0.1:7657/logs.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." msgstr "" #: i2p2www/pages/site/faq.html:1070 @@ -4482,40 +3982,38 @@ msgid "" "
  • on irc.freenode.net channel #i2p
  • \n" "
  • on IRC2P channel #i2p
  • \n" "\n" -"or post to the forum and we'll post it " -"here (with the answer, hopefully)." +"or post to the forum and we'll post it here (with the answer, hopefully)." msgstr "" #: i2p2www/pages/site/impressum.html:4 msgid "German laws" -msgstr "" +msgstr "القوانين الألمانية" #: i2p2www/pages/site/index.html:2 msgid "I2P Anonymous Network" -msgstr "" +msgstr "شبكة I2P المجهولة" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." msgstr "" #: i2p2www/pages/site/index.html:8 msgid "Welcome to the Invisible Internet" -msgstr "" +msgstr "يا أهلًا وسهلًا بالإنترنت الخفي" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " msgstr "" #: i2p2www/pages/site/index.html:11 #, python-format msgid "Get I2P %(version)s" -msgstr "" +msgstr "احصل على I2P %(version)s" #: i2p2www/pages/site/index.html:15 msgid "What is I2P?" @@ -4524,45 +4022,41 @@ msgstr "ما هو I2P ؟" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." msgstr "" #: i2p2www/pages/site/index.html:23 msgid "I2P Cares About Privacy" -msgstr "" +msgstr "يهتم I2P بالخصوصية" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/index.html:27 msgid "Read more…" -msgstr "" +msgstr "اقرأ المزيد…" #: i2p2www/pages/site/index.html:32 msgid "Peer-to-Peer" -msgstr "" +msgstr "النظير للنظير" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." msgstr "" #: i2p2www/pages/site/index.html:33 @@ -4571,7 +4065,7 @@ msgstr "" #: i2p2www/pages/site/index.html:35 msgid "Privacy and Security By Design" -msgstr "" +msgstr "الخصوصية والأمان بالتصميم" #: i2p2www/pages/site/index.html:36 msgid "" @@ -4585,11 +4079,11 @@ msgstr "" #: i2p2www/pages/site/index.html:39 msgid "Built For Communication" -msgstr "" +msgstr "بُني للتواصل" #: i2p2www/pages/site/index.html:40 msgid "I2P has an application layer with easy to use " -msgstr "" +msgstr "I2P لديه طبقة تطبيقات سهلة الاستخدام" #: i2p2www/pages/site/index.html:40 msgid "APIs for creating your own privacy - aware apps." @@ -4597,7 +4091,7 @@ msgstr "" #: i2p2www/pages/site/index.html:44 msgid "News & Updates" -msgstr "" +msgstr "الأخبار والتحديثات" #: i2p2www/pages/site/links.html:2 msgid "Links" @@ -4605,27 +4099,26 @@ msgstr "روابط" #: i2p2www/pages/site/links.html:4 msgid "Recommended Links & Resources" -msgstr "" +msgstr "روابط ومصادر موصى بها" #: i2p2www/pages/site/links.html:5 #, python-format msgid "" "See also the page with\n" -"links to presentations, videos, and tutorials about" -" I2P." +"links to presentations, videos, and tutorials about I2P." msgstr "" #: i2p2www/pages/site/links.html:12 msgid "I2P on the web" -msgstr "" +msgstr "I2P على الويب" #: i2p2www/pages/site/links.html:19 msgid "Friends of I2P" -msgstr "" +msgstr "أصدقاء لـI2P" #: i2p2www/pages/site/links.html:33 msgid "More Projects and Documentation" -msgstr "" +msgstr "مشاريع ووثائق أكثر" #: i2p2www/pages/site/links.html:43 msgid "Press" @@ -4633,34 +4126,8 @@ msgstr "صحافة" #: i2p2www/pages/site/links.html:47 msgid "Boards, newssite, others" -msgstr "" +msgstr "لوحات، أخبار، وأُخر" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" -msgstr "" - - - - - - - - - - - - - - - - - - - - - - - - - - +msgstr "أشياء قديمة جدًا" diff --git a/i2p2www/translations/ar/LC_MESSAGES/research.po b/i2p2www/translations/ar/LC_MESSAGES/research.po index 6cc600da..55be48b2 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/research.po +++ b/i2p2www/translations/ar/LC_MESSAGES/research.po @@ -1,23 +1,24 @@ -# Arabic translations for I2P. -# Copyright (C) 2021 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Tashigi OP, 2018 +# Tashigi OP, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-08-21 15:33+0000\n" "PO-Revision-Date: 2013-07-15 12:01+0000\n" "Last-Translator: Tashigi OP, 2018\n" -"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" +"Language-Team: Arabic (http://app.transifex.com/otf/I2P/language/ar/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -38,42 +39,24 @@ msgstr "بحثٌ عن شبكة I2P" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." -msgstr "" -"مشروع I2P هو مشروع فريد من نوعه لم يحصل لسوء الحظ على الاهتمام الواسع \n" -"من الدراسات الأكاديميّة الّتي يستحقها. حتى اليوم، تركز معظم البحوث على " -"المجهول\n" -"و تقنية توجيه البصل الّتي كانت حول مشروع Tor, وبينما أنّ هذه اﻷوراق " -"تفيدنا كذلك,\n" -"ما زال هناك حاجة كبيرة إلى بحوث تركز على I2P. هذا يلعب دورًا رئيسًا\n" -"في الحفاظ على كلٍّ من الحماية، وسلامة أمن الشبكة، كما يفتح أيضًا\n" -"أبواب للمزيد من البحوث والتطويرات المؤثرة في المستقبل." +msgstr "مشروع I2P هو مشروع فريد من نوعه لم يحصل لسوء الحظ على الاهتمام الواسع \nمن الدراسات الأكاديميّة الّتي يستحقها. حتى اليوم، تركز معظم البحوث على المجهول\nو تقنية توجيه البصل الّتي كانت حول مشروع Tor, وبينما أنّ هذه اﻷوراق تفيدنا كذلك,\nما زال هناك حاجة كبيرة إلى بحوث تركز على I2P. هذا يلعب دورًا رئيسًا\nفي الحفاظ على كلٍّ من الحماية، وسلامة أمن الشبكة، كما يفتح أيضًا\nأبواب للمزيد من البحوث والتطويرات المؤثرة في المستقبل." #: i2p2www/pages/site/research/index.html:19 #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "Free Haven Anonymity Bibliography.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" msgstr "" @@ -82,16 +65,13 @@ msgstr "" msgid "" "A list of known published papers about I2P is available here." -msgstr "" -" قائمة باﻷوراق المعروفة الّتي نشرت حول I2P متوفرةهنا" +msgstr " قائمة باﻷوراق المعروفة الّتي نشرت حول I2P متوفرةهنا" #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" msgstr "" @@ -105,16 +85,12 @@ msgstr "البحوث الدّفاعيّة" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" @@ -125,27 +101,17 @@ msgstr "الاختباراتُ الهجوميّة والتحليليّة" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"please \n" -"communicate your ideas to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to please \n" +"communicate your ideas to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" @@ -161,13 +127,11 @@ msgstr "إرشادات عامّة" msgid "" "
      \n" "
    1. \n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" "
    2. \n" "
    3. \n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" "
    4. \n" "
    5. \n" @@ -175,10 +139,8 @@ msgid "" " collecting data about yourself\n" "
    6. \n" "
    7. \n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" "
    8. \n" "
    9. \n" @@ -186,10 +148,8 @@ msgid "" " publication and collect as little as possible\n" "
    10. \n" "
    11. \n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is not intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is not intended to be private by the\n" " originator\n" "
    12. \n" "
    " @@ -201,32 +161,24 @@ msgstr "استخدام شبكة اختبار لمهاجمة I2P" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add i2p.vmCommSystem=true to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add i2p.vmCommSystem=true to the\n" "router.config before starting." msgstr "" @@ -237,13 +189,10 @@ msgstr "اختبار على شبكة I2P الحيّة" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please contact\n" +"As stated above in the researcher notes, please contact\n" " us before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -253,35 +202,23 @@ msgstr "تهيئة موجه العائلة" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -331,13 +268,12 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:2 msgid "Vulnerability Response Process" -msgstr "" +msgstr "عملية الرد على نقاط الضعف" #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." +"This process is subject to change. Please refer to this page for the current VRP." msgstr "" #: i2p2www/pages/site/research/vrp.html:10 @@ -346,22 +282,15 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:12 msgid "" -"Researchers: while you research/hack, we ask that you refrain from the " -"following: - Performing active exploits or Denial of Service attacks on " -"the\n" -"i2p network - Performing social engineering on i2p development team " -"members - Performing any physical or electronic attempts against i2p " -"property and/or data\n" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" "centers" msgstr "" #: i2p2www/pages/site/research/vrp.html:15 msgid "" -"As i2p is an open-source community, many volunteers and development team " -"members run their own I2P Sites as well as public (“non-private " -"internet”) domains. These\n" -"sites/servers are NOT in the scope of the vulnerability assessment / " -"response process, only the underlying code of i2p is." +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." msgstr "" #: i2p2www/pages/site/research/vrp.html:18 @@ -388,8 +317,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." msgstr "" @@ -402,8 +330,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." msgstr "" @@ -423,8 +350,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." msgstr "" #: i2p2www/pages/site/research/vrp.html:70 @@ -436,8 +363,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Affects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." msgstr "" #: i2p2www/pages/site/research/vrp.html:79 @@ -455,19 +382,18 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." msgstr "" #: i2p2www/pages/site/research/vrp.html:98 -msgid "The notification should list appropriate steps for users to take, if any." +msgid "" +"The notification should list appropriate steps for users to take, if any." msgstr "" #: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." msgstr "" @@ -490,8 +416,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:122 msgid "" "Response Manager works on a patch LOCALLY, patches are shared by the " -"response team via PGP-encrypted e-mail until such a time as it is safe to" -" expose to the public." +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" #: i2p2www/pages/site/research/vrp.html:125 @@ -500,10 +426,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." msgstr "" #: i2p2www/pages/site/research/vrp.html:132 @@ -538,19 +462,14 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." +"Response Manager includes vulnerability announcement draft in release notes." msgstr "" #: i2p2www/pages/site/research/vrp.html:162 msgid "" -"Proceed with the Point or Regular Release. At this time, it is not " -"possible to release an in-network update for only one operating system or" -"\n" -"\t\tarchitecture. In order that all affected products can be released as " -"quickly as possible, the person responsible\n" -"\t\tfor that software should be able to perform necessary release " -"processes in a timely manner. Importantly this should include\n" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" @@ -560,11 +479,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." msgstr "" #: i2p2www/pages/site/research/vrp.html:179 -msgid "If the Incident Response process in section III is successfully completed:" +msgid "" +"If the Incident Response process in section III is successfully completed:" msgstr "" #: i2p2www/pages/site/research/vrp.html:183 @@ -616,8 +537,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." msgstr "" #: i2p2www/pages/site/research/vrp.html:217 @@ -625,13 +546,14 @@ msgid "If applicable, credits to the original reporter." msgstr "" #: i2p2www/pages/site/research/vrp.html:222 -msgid "Release finalized vulnerability announcement on website and in news feed." +msgid "" +"Release finalized vulnerability announcement on website and in news feed." msgstr "" #: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" msgstr "" #: i2p2www/pages/site/research/vrp.html:238 @@ -640,8 +562,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." msgstr "" #: i2p2www/pages/site/research/vrp.html:250 @@ -652,33 +574,28 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." msgstr "" #: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." msgstr "" #: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." msgstr "" #: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." msgstr "" @@ -693,7 +610,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:282 #: i2p2www/pages/site/research/vrp.html:302 -msgid "Response Team and developers should coordinate to work on the following:" +msgid "" +"Response Team and developers should coordinate to work on the following:" msgstr "" #: i2p2www/pages/site/research/vrp.html:286 @@ -722,15 +640,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." +"If results are not sensitive, share with the public via IRC or public Trac." msgstr "" #: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." msgstr "" @@ -740,10 +656,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" msgstr "" @@ -753,8 +667,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." msgstr "" @@ -791,4 +704,3 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "" - diff --git a/i2p2www/translations/es/LC_MESSAGES/priority.po b/i2p2www/translations/es/LC_MESSAGES/priority.po index f8e91b00..86300c92 100644 --- a/i2p2www/translations/es/LC_MESSAGES/priority.po +++ b/i2p2www/translations/es/LC_MESSAGES/priority.po @@ -1,36 +1,48 @@ -# Spanish translations for I2P. +# Translations template for I2P. # Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 -# <454cc45058db9632179dc8079c0c1af3_5311>, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # Adolfo Jayme-Barrientos, 2013 +# Adolfo Jayme-Barrientos, 2013 +# Adolfo Jayme-Barrientos, 2013 +# Adolfo Jayme-Barrientos, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # de1ca222968aa9b5291789e94a1b3b8a_f1329af, 2019 # fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# Adolfo Jayme-Barrientos, 2013 # Juan Jaramillo , 2019 # Juan Jaramillo , 2019,2022 # m1xxy , 2011 +# Manuel , 2023 +# Oliver Trash , 2013 # Oliver Trash , 2013 # Rodrigo Lledó , 2023 +# de1ca222968aa9b5291789e94a1b3b8a_f1329af, 2019 +# str4d , 2014 # str4d , 2014 # strel, 2013 # strel, 2013-2018 +# strel, 2013 # trolly, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-11-08 21:15+0000\n" "PO-Revision-Date: 2013-02-03 00:02+0000\n" -"Last-Translator: fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013\n" +"Last-Translator: Manuel , 2023\n" "Language-Team: Spanish (http://app.transifex.com/otf/I2P/language/es/)\n" -"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 " -"? 1 : 2\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es\n" +"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" @@ -69,14 +81,10 @@ msgstr "Autor:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P and to utilize the outproxies available within I2P. Below are " +"Your web browser will need to be configured in order to browse web sites on " +"I2P and to utilize the outproxies available within I2P. Below are " "walkthroughs for some of the most popular browsers." -msgstr "" -"Su navegador web deberá ser configurado para poder navegar por sitios web" -" en I2P y para utilizar los outproxies disponibles en I2P. A " -"continuación, se presentan guías para algunos de los navegadores más " -"populares." +msgstr "Su navegador web deberá ser configurado para poder navegar por sitios web en I2P y para utilizar los outproxies disponibles en I2P. A continuación, se presentan guías para algunos de los navegadores más populares." #: i2p2www/pages/downloads/browser-content.html:3 msgid "Firefox Profile for Windows" @@ -85,21 +93,15 @@ msgstr "Perfil de Firefox para Windows" #: i2p2www/pages/downloads/browser-content.html:4 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" " Firefox profile." -msgstr "" -"Si utiliza Windows, la forma recomendada de acceder a I2P es utilizando " -"el\n" -" perfil de Firefox." +msgstr "Si utiliza Windows, la forma recomendada de acceder a I2P es utilizando el\n perfil de Firefox." #: i2p2www/pages/downloads/browser-content.html:6 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -" configure your browser yourself. Read below on how to that." -msgstr "" -"Si no desea utilizar ese perfil o no está en Windows, tiene que " -"configurar su navegador usted mismo. Lea a continuación cómo hacerlo." +"If you do not wish to use that profile or are not on Windows, you need to " +"configure your browser yourself. Read below on how to that." +msgstr "Si no desea utilizar ese perfil o no está en Windows, tiene que configurar su navegador usted mismo. Lea a continuación cómo hacerlo." #: i2p2www/pages/downloads/browser-content.html:8 msgid "How to configure your browser" @@ -116,51 +118,30 @@ msgstr "Configuración basada en extensiones: I2P en la navegación privada" #: i2p2www/pages/downloads/browser-content.html:21 msgid "" -"A new way of automatically configuring the I2P Browser is currently being" -" tested. It uses the Firefox's \"Container Tabs\" to build private " -"browsing tools for use with I2P and I2P applications." -msgstr "" -"Actualmente se está probando una nueva forma de configurar " -"automáticamente el navegador I2P. Utiliza las \"pestañas contenedoras\" " -"de Firefox para construir herramientas de navegación privada para su uso " -"con I2P y aplicaciones I2P." +"A new way of automatically configuring the I2P Browser is currently being " +"tested. It uses the Firefox's \"Container Tabs\" to build private browsing " +"tools for use with I2P and I2P applications." +msgstr "Actualmente se está probando una nueva forma de configurar automáticamente el navegador I2P. Utiliza las \"pestañas contenedoras\" de Firefox para construir herramientas de navegación privada para su uso con I2P y aplicaciones I2P." #: i2p2www/pages/downloads/browser-content.html:22 msgid "" -"It does pre-configuration of your browser by enabling some of the privacy" -" Browser Settings like ResistFingerprinting, and enforces WebRTC proxy " -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving Firefox's integration\n" -" with I2P. It should not substantially interfere with your non-I2P " -"Firefox tabs. " -msgstr "" -"Realiza la preconfiguración de tu navegador habilitando algunos de los " -"Ajustes de privacidad del navegador como ResistFingerprinting, e impone " -"la obediencia al proxy WebRTC. También contiene menús, accesos directos y" -" herramientas de supervisión que mejoran la integración de Firefox con " -"I2P.\n" -" con I2P. No debería interferir sustancialmente con tus pestañas " -"Firefox no I2P. " +"It does pre-configuration of your browser by enabling some of the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy obedience. It also contains menus, shortcuts, and monitoring tools improving Firefox's integration\n" +" with I2P. It should not substantially interfere with your non-I2P Firefox tabs. " +msgstr "Realiza la preconfiguración de tu navegador habilitando algunos de los Ajustes de privacidad del navegador como ResistFingerprinting, e impone la obediencia al proxy WebRTC. También contiene menús, accesos directos y herramientas de supervisión que mejoran la integración de Firefox con I2P.\n con I2P. No debería interferir sustancialmente con tus pestañas Firefox no I2P. " #: i2p2www/pages/downloads/browser-content.html:24 msgid "" -"The extension, I2P in Private Browsing, can be obtained " -"from the Mozilla addon store. " -msgstr "" -"La extensión, I2P in Private Browsing, puede obtenerse " -"en la tienda de complementos de Mozilla. " +"The extension, I2P in Private Browsing, can" +" be obtained from the Mozilla addon store. " +msgstr "La extensión, I2P in Private Browsing, puede obtenerse en la tienda de complementos de Mozilla. " #: i2p2www/pages/downloads/browser-content.html:25 msgid "" "The source code for the extension is available at i2pgit.org. " -msgstr "" -"El código fuente de la extensión está disponible en i2pgit.org. " +msgstr "El código fuente de la extensión está disponible en i2pgit.org. " #: i2p2www/pages/downloads/browser-content.html:26 msgid "Instructions for Firefox 57 and above:" @@ -168,14 +149,10 @@ msgstr "Instrucciones para Firefox 57 y superiores:" #: i2p2www/pages/downloads/browser-content.html:27 msgid "" -"From the Menu button in the top right, select Preferences. " -"Scroll down until you see the Network Proxy section, as shown in" -" the screenshot below. Click on Settings" -msgstr "" -"En el botón Menú de la parte superior derecha, seleccione " -"Preferencias. Desplácese hacia abajo hasta que vea la sección " -"Proxy de red, como se muestra en la siguiente captura de " -"pantalla. Haga clic en Configuración" +"From the Menu button in the top right, select Preferences. Scroll " +"down until you see the Network Proxy section, as shown in the " +"screenshot below. Click on Settings" +msgstr "En el botón Menú de la parte superior derecha, seleccione Preferencias. Desplácese hacia abajo hasta que vea la sección Proxy de red, como se muestra en la siguiente captura de pantalla. Haga clic en Configuración" #: i2p2www/pages/downloads/browser-content.html:28 msgid "Firefox57 Network Options" @@ -185,17 +162,14 @@ msgstr "Opciones de red de Firefox57" msgid "" "In the Connection Settings pop-up, select Manual proxy\n" " configuration. Set both the HTTP and SSL Proxy to address\n" -" 127.0.0.1 with port 4444 as shown in the " -"following screenshot." -msgstr "" +" 127.0.0.1 with port 4444 as shown in the following screenshot." +msgstr "En la ventana emergente Configuración de la conexión seleccione Configuración manual \n del proxy. Establezca tanto el proxy HTTP como el SSL en la dirección\n 127.0.0.1 con el puerto4444 como se muestra en la siguiente captura de pantalla." #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "Firefox57\n" "Connection Settings" -msgstr "" -"Firefox57\n" -"Configuración de la conexión" +msgstr "Firefox57\nConfiguración de la conexión" #: i2p2www/pages/downloads/browser-content.html:34 msgid "Firefox57 Connection Settings" @@ -205,18 +179,13 @@ msgstr "Configuración de conexión de Firefox57" msgid "" "Finally, go to the address about:config and find the property " "media.peerConnection.ice.proxy_only. Ensure that this setting is True." -msgstr "" -"Por último, vaya a la dirección about:config y busque la " -"propiedad media.peerConnection.ice.proxy_only. Asegúrese de que esta " -"configuración es True." +msgstr "Por último, vaya a la dirección about:config y busque la propiedad media.peerConnection.ice.proxy_only. Asegúrese de que esta configuración es True." #: i2p2www/pages/downloads/browser-content.html:37 msgid "" "Firefox57\n" "PeerConnection Settings" -msgstr "" -"Firefox57\n" -"Configuración de PeerConnection" +msgstr "Firefox57\nConfiguración de PeerConnection" #: i2p2www/pages/downloads/browser-content.html:38 msgid "Firefox57 PeerConnection Settings" @@ -230,19 +199,12 @@ msgstr " Chrome " msgid "" "Extension-based Configuration: I2PChrome.js(Experimental, additional " "configuration)" -msgstr "" +msgstr "Configuración basada en extensiones: I2PChrome.js(Experimental, configuración adicional)" #: i2p2www/pages/downloads/browser-content.html:43 msgid "" -"An experimental, partially-automated configuration process for Chrome is " -"available. In order to configure it, create a new Profile " -"especially for your I2P browsing, separate from the default profile. Then" -" install this Extension" -" in your newly-created profile. This profile is now configured to use " -"I2P. Highly detailed instructions are available at the\n" -" homepage. " +"An experimental, partially-automated configuration process for Chrome is available. In order to configure it, create a new Profile especially for your I2P browsing, separate from the default profile. Then install this Extension in your newly-created profile. This profile is now configured to use I2P. Highly detailed instructions are available at the\n" +" homepage. " msgstr "" #: i2p2www/pages/downloads/browser-content.html:45 @@ -251,12 +213,8 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:46 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their proxy settings depending on variant and platform. These " -"instructions may be slightly different in Brave or Iridium, for instance." -" From the Main menu, navigate\n" -" to the Settings, and search for the menu item. " -"Clicking it will open the right settings for your platform." +"Chromium-Based Browsers like Chrome have slightly different places for their proxy settings depending on variant and platform. These instructions may be slightly different in Brave or Iridium, for instance. From the Main menu, navigate\n" +" to the Settings, and search for the menu item. Clicking it will open the right settings for your platform." msgstr "" #: i2p2www/pages/downloads/browser-content.html:48 @@ -265,9 +223,9 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:49 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used by Internet Explorer, and you can " -"configure it by following the Internet Explorer 8 guide." +"On Windows, this button will launch you into the shared proxy settings used " +"by Internet Explorer, and you can configure it" +" by following the Internet Explorer 8 guide." msgstr "" #: i2p2www/pages/downloads/browser-content.html:52 @@ -280,36 +238,24 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:54 msgid "" -"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an " -"about:config page for you to configure proxy settings manually. It is " -"further not possible to use most extensions in Fenix-based Firefoxes. It " -"is possible to enable support\n" -" about:config and enable more extensions in Firefox Nightly at the " -"time of this writing, but it's a manual and difficult process. " -"IceRaven is a fork of Firefox which enables a collection of " -"extensions while Mozilla and the Mozilla Community\n" -" work on adding support for extensions to Firefox for Android. It " -"provides the easiest way of configuring a modern Firefox-based Browser " -"for Android. It does not come from Mozilla and carries no guarantees from" -" them. Installing the extension\n" +"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an about:config page for you to configure proxy settings manually. It is further not possible to use most extensions in Fenix-based Firefoxes. It is possible to enable support\n" +" about:config and enable more extensions in Firefox Nightly at the time of this writing, but it's a manual and difficult process. IceRaven is a fork of Firefox which enables a collection of extensions while Mozilla and the Mozilla Community\n" +" work on adding support for extensions to Firefox for Android. It provides the easiest way of configuring a modern Firefox-based Browser for Android. It does not come from Mozilla and carries no guarantees from them. Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P." msgstr "" #: i2p2www/pages/downloads/browser-content.html:58 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been using IceRaven for a while, go to the main menu, select the History " -"tab, and make sure that you have cleared information about your past " -"browsing by tapping the \"Delete\n" +"If you have not installed IceRaven yet, go to the next step. If you have been using IceRaven for a while, go to the main menu, select the History tab, and make sure that you have cleared information about your past browsing by tapping the \"Delete\n" " History\" button." msgstr "" #: i2p2www/pages/downloads/browser-content.html:60 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-" -"Ons\" submenu. Install the extension named I2P Proxy for Android and " -"other Systems. " +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-" +"Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" " +"submenu. Install the extension named I2P Proxy for Android and other " +"Systems. " msgstr "" #: i2p2www/pages/downloads/browser-content.html:61 @@ -318,31 +264,21 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:62 msgid "" -"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web " -"browsers, if installed from the following addons.mozilla.org URL.\n" -" I2P Proxy for Android and Other Systems\n" +"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web browsers, if installed from the following addons.mozilla.org URL.\n" +" I2P Proxy for Android and Other Systems\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:65 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." +"This extension is identical to the Chromium extension and is built from the " +"same source." msgstr "" #: i2p2www/pages/downloads/browser-content.html:66 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their Blog" -msgstr "" -"Para habilitar el soporte de extensiones en Firefox Nightly, debes seguir" -"\n" -"los pasos proporcionados por Mozilla en su Blog" +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their Blog" +msgstr "Para habilitar el soporte de extensiones en Firefox Nightly, debes seguir\nlos pasos proporcionados por Mozilla en su Blog" #: i2p2www/pages/downloads/browser-content.html:71 msgid "Internet Explorer" @@ -350,16 +286,10 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:72 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." -msgstr "" -"En el menú de inicio, busque \"Configuración de red e Internet\" para " -"abrir la configuración.\n" -"configuración. La última entrada en el menú es la Configuración del " -"proxy, haga clic en él para\n" -"su proxy para conectarse a I2P." +msgstr "En el menú de inicio, busque \"Configuración de red e Internet\" para abrir la configuración.\nconfiguración. La última entrada en el menú es la Configuración del proxy, haga clic en él para\nsu proxy para conectarse a I2P." #: i2p2www/pages/downloads/browser-content.html:77 msgid "IE Internet Options" @@ -367,21 +297,12 @@ msgstr "Opciones de Internet de IE" #: i2p2www/pages/downloads/browser-content.html:78 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." -msgstr "" -"Ahora active en la casilla de confirmación \"usar un servidor proxy para " -"la LAN\" y también en \"Ignorar servidor para conexiones locales\". " -"Pulsando en opciones avanzadas abrirá la ventana para abrir puertos. " -"Entre los valores de la imagen, IP 127.0.0.1y puerto 4444 para HTTP, " -"puerto 4445 para HTTPS." +msgstr "Ahora active en la casilla de confirmación \"usar un servidor proxy para la LAN\" y también en \"Ignorar servidor para conexiones locales\". Pulsando en opciones avanzadas abrirá la ventana para abrir puertos. Entre los valores de la imagen, IP 127.0.0.1y puerto 4444 para HTTP, puerto 4445 para HTTPS." #: i2p2www/pages/downloads/browser-content.html:85 msgid "IE Proxy Settings" @@ -391,46 +312,34 @@ msgstr "Configuración proxy en IE" msgid "" "I2P is not designed for creating proxies to the Internet.\n" "Instead, it is meant to be used as an internal network." -msgstr "" -"I2P no está diseñado para crear proxies hacia Internet.\n" -"Por el contrario, está pensada para utilizarse como red interna." +msgstr "I2P no está diseñado para crear proxies hacia Internet.\nPor el contrario, está pensada para utilizarse como red interna." #: i2p2www/pages/downloads/browser-content.html:94 msgid "" -"

    The I2P project itself does not run any proxies to the " -"Internet.\n" -"The I2P software includes a default outproxy: exit.stormycloud.i2p.\n" -"These are run by a volunteer.

    \n" -"https://stormycloud.org" -msgstr "" -"

    The I2P project itself does not run any proxies to the " -"Internet.\n" +"

    The I2P project itself does not run any proxies to the Internet.\n" "The I2P software includes a default outproxy: exit.stormycloud.i2p.\n" "These are run by a volunteer.

    \n" "https://stormycloud.org" +msgstr "

    The I2P project itself does not run any proxies to the Internet.\nThe I2P software includes a default outproxy: exit.stormycloud.i2p.\nThese are run by a volunteer.

    \nhttps://stormycloud.org" #: i2p2www/pages/downloads/browser-content.html:101 #, python-format -msgid "By default, I2P comes with one outproxy configured: %(http)s." +msgid "" +"By default, I2P comes with one outproxy configured: %(http)s." msgstr "Por defecto, I2P viene con un outproxy configurado: %(http)s." #: i2p2www/pages/downloads/browser-content.html:104 msgid "" "I2P Sites that are accessible via .i2p addresses are also\n" "not allowed via the outproxies." -msgstr "" -"Los sitios I2P accesibles a través de direcciones .i2p tampoco están\n" -"no están permitidos a través de los outproxies." +msgstr "Los sitios I2P accesibles a través de direcciones .i2p tampoco están\nno están permitidos a través de los outproxies." #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Tor provides a browser to use " -"as an outproxy to the Internet." -msgstr "" -"Tor proporciona un navegador " -"para utilizar como outproxy a Internet." +"Tor provides a browser to use as " +"an outproxy to the Internet." +msgstr "Tor proporciona un navegador para utilizar como outproxy a Internet." #: i2p2www/pages/downloads/config.html:2 i2p2www/pages/site/faq.html:19 msgid "Configuration" @@ -446,9 +355,7 @@ msgstr "Debian o Ubuntu, todas las versiones" #: i2p2www/pages/downloads/debian.html:7 msgid "The Debian packages should work on most platforms running:" -msgstr "" -"Los paquetes de Debian deberían funcionar en la mayoría de las " -"plataformas en ejecución:" +msgstr "Los paquetes de Debian deberían funcionar en la mayoría de las plataformas en ejecución:" #: i2p2www/pages/downloads/debian.html:9 msgid "Ubuntu (Bionic 18.04 and newer)" @@ -465,8 +372,7 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:15 #, python-format msgid "" -"The I2P packages may work on systems not listed above. Please " -"report any issues\n" +"The I2P packages may work on systems not listed above. Please report any issues\n" "with these packages on Gitlab at\n" "i2p.i2p." msgstr "" @@ -475,9 +381,7 @@ msgstr "" msgid "" "Option 1: Recent versions of Ubuntu and its " "derivatives (Try this if you're not using Debian)" -msgstr "" -"Opción 1: Versiones recientes de Ubuntu y sus " -"derivados (Pruebe esto si no usa Debian)" +msgstr "Opción 1: Versiones recientes de Ubuntu y sus derivados (Pruebe esto si no usa Debian)" #: i2p2www/pages/downloads/debian.html:22 msgid "Option 2: Debian (including Debian-derivatives)" @@ -497,17 +401,10 @@ msgstr "Abra un terminal e introduzca:" #: i2p2www/pages/downloads/debian.html:31 msgid "" -"This command will add the PPA to /etc/apt/sources.list.d and" -" fetch\n" -"the gpg key that the repository has been signed with. The GPG key ensures" -"\n" +"This command will add the PPA to /etc/apt/sources.list.d and fetch\n" +"the gpg key that the repository has been signed with. The GPG key ensures\n" "that the packages have not been tampered with since being built." -msgstr "" -"Este comando añadirá el PPA a /etc/apt/sources.list.d y " -"obtendrá\n" -"la clave gpg con la que se ha firmado el repositorio. La clave GPG " -"asegura\n" -"que los paquetes no han sido manipulados desde su creación." +msgstr "Este comando añadirá el PPA a /etc/apt/sources.list.d y obtendrá\nla clave gpg con la que se ha firmado el repositorio. La clave GPG asegura\nque los paquetes no han sido manipulados desde su creación." #: i2p2www/pages/downloads/debian.html:38 msgid "Notify your package manager of the new PPA by entering:" @@ -518,10 +415,7 @@ msgid "" "This command will retrieve the latest list of software from each\n" "repository that is enabled on your system, including the I2P PPA that\n" "was added with the earlier command." -msgstr "" -"Este comando obtendrá la última lista de aplicaciones de cada\n" -"repositorio que esté habilitado en su sistema, incluyendo\n" -"el PPA de I2P que hemos añadido anteriormente." +msgstr "Este comando obtendrá la última lista de aplicaciones de cada\nrepositorio que esté habilitado en su sistema, incluyendo\nel PPA de I2P que hemos añadido anteriormente." #: i2p2www/pages/downloads/debian.html:46 msgid "You are now ready to install I2P!" @@ -539,18 +433,13 @@ msgstr "Abra \"Software y actualizaciones\" a través del menú de aplicaciones. msgid "" "Select the \"Other Software\" tab and click the \"Add\" button at the\n" " bottom to configure the PPA." -msgstr "" -"Seleccione la pestaña \"Otro software\" y haga clic en el botón " -"\"Añadir\" en la parte inferior para configurar el PPA.\n" -" inferior para configurar el PPA." +msgstr "Seleccione la pestaña \"Otro software\" y haga clic en el botón \"Añadir\" en la parte inferior para configurar el PPA.\n inferior para configurar el PPA." #: i2p2www/pages/downloads/debian.html:64 msgid "" "Add the PPA by pasting the URL: ppa:i2p-maintainers/i2p\n" " into the PPA dialog." -msgstr "" -"Añade el PPA pegando la URL: ppa:i2p-maintainers/i2p\n" -" en el diálogo PPA." +msgstr "Añade el PPA pegando la URL: ppa:i2p-maintainers/i2p\n en el diálogo PPA." #: i2p2www/pages/downloads/debian.html:70 msgid "Download the repository information with the \"Reload\" button." @@ -560,19 +449,13 @@ msgstr "Descargue la información del repositorio con el botón \"Recargar\"." msgid "" "Install the I2P software using the \"Software\" tool from the\n" " applications menu." -msgstr "" -"Instale el software I2P mediante la herramienta \"Software\" del menú\n" -" menú de aplicaciones." +msgstr "Instale el software I2P mediante la herramienta \"Software\" del menú\n menú de aplicaciones." #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of starting I2P and configuring " -"it for your system." -msgstr "" -"Tras completar el proceso de instalación puede pasar a la siguiente\n" -"parte de la inicialización de I2P, y " -"configurarlo para su sistema." +"part of starting I2P and configuring it for your system." +msgstr "Tras completar el proceso de instalación puede pasar a la siguiente\nparte de la inicialización de I2P, y configurarlo para su sistema." #: i2p2www/pages/downloads/debian.html:87 msgid "Instructions for Debian" @@ -584,35 +467,29 @@ msgstr "Arquitecturas actualmente soportadas" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with su or by prefixing each command with " -"sudo)." +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with su or by prefixing each command with sudo)." msgstr "" #: i2p2www/pages/downloads/debian.html:96 msgid "" -"Ensure that apt-transport-https, curl, lsb-release are installed." +"Ensure that apt-transport-https, curl, lsb-" +"release are installed." msgstr "" #: i2p2www/pages/downloads/debian.html:103 #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the Debian wiki\n" +" Check which version of Debian you are using on this page at the Debian wiki\n" " and verify with %(file2)s on your system.\n" -" Then, for Debian Bullseye or newer distributions run the following " -"command to create %(file)s." +" Then, for Debian Bullseye or newer distributions run the following command to create %(file)s." msgstr "" #: i2p2www/pages/downloads/debian.html:125 #, python-format msgid "Download the key used to sign the repository:" -msgstr "" -"Descargue la clave utilizada para firmar el " -"repositorio:" +msgstr "Descargue la clave utilizada para firmar el repositorio:" #: i2p2www/pages/downloads/debian.html:135 msgid "Display the key fingerprint." @@ -633,28 +510,22 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:168 msgid "" "This command will retrieve the latest list of software\n" -" from every repository enabled on your system, including the I2P " -"repository\n" +" from every repository enabled on your system, including the I2P repository\n" " added in step 1." msgstr "" #: i2p2www/pages/downloads/debian.html:175 msgid "" -"You are now ready to install I2P! Installing the i2p-keyring" -"\n" -" package will ensure that you receive updates to the repository's GPG " -"key." +"You are now ready to install I2P! Installing the i2p-keyring\n" +" package will ensure that you receive updates to the repository's GPG key." msgstr "" #: i2p2www/pages/downloads/debian.html:185 msgid "" -"After the installation process completes you can move on to the next part" -" of starting I2P and configuring it " -"for your system." -msgstr "" -"Tras completar el proceso de instalación puede pasar a la siguiente parte" -" de la inicialización de I2P, y " -"configurarlo para su sistema." +"After the installation process completes you can move on to the next part of" +" starting I2P and configuring it for your" +" system." +msgstr "Tras completar el proceso de instalación puede pasar a la siguiente parte de la inicialización de I2P, y configurarlo para su sistema." #: i2p2www/pages/downloads/debian.html:190 #: i2p2www/pages/downloads/post-install.html:1 @@ -665,90 +536,51 @@ msgstr "Tareas post-instalación" msgid "" "Using these I2P packages the I2P router can be started in the following\n" "three ways:" -msgstr "" -"El router I2P se puede iniciar usando estos paquetes I2P de las tres " -"maneras siguientes:" +msgstr "El router I2P se puede iniciar usando estos paquetes I2P de las tres maneras siguientes:" #: i2p2www/pages/downloads/debian.html:198 msgid "" -""on demand" using the i2prouter script. Simply run " -""i2prouter\n" -"start" from a command prompt. (Note: Do " -"not use\n" +""on demand" using the i2prouter script. Simply run "i2prouter\n" +"start" from a command prompt. (Note: Do not use\n" "sudo or run it as root!)" -msgstr "" -""a petición" usando el script i2prouter. Simplemente ejecute\n" -""i2prouter start" en una línea de comandos.\n" -"(Nota: ¡No utilice sudo ni lo ejecute como root!)" +msgstr ""a petición" usando el script i2prouter. Simplemente ejecute\n"i2prouter start" en una línea de comandos.\n(Nota: ¡No utilice sudo ni lo ejecute como root!)" #: i2p2www/pages/downloads/debian.html:205 msgid "" -""on demand" without the java service wrapper\n" -"(needed on non-Linux/non-x86 systems) by running \"i2prouter-" -"nowrapper\".\n" +""on demand" without the java service wrapper\n" +"(needed on non-Linux/non-x86 systems) by running \"i2prouter-nowrapper\".\n" "(Note: Do not\n" "use sudo or run it as root!)" -msgstr "" -""a petición" sin el java service " -"wrapper (encapsulador como servicio para java, \n" -"necesario en sistemas no-Linux/no-x86) ejecutando \"i2prouter-" -"nowrapper\".\n" -"(Nota: ¡No utilice sudo ni lo ejecute como root!)" +msgstr ""a petición" sin el java service wrapper (encapsulador como servicio para java, \nnecesario en sistemas no-Linux/no-x86) ejecutando \"i2prouter-nowrapper\".\n(Nota: ¡No utilice sudo ni lo ejecute como root!)" #: i2p2www/pages/downloads/debian.html:213 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"dpkg-" -"reconfigure\n" -"i2p\" as root or using sudo. This is the recommended means of " -"operation." -msgstr "" -"como un servicio que se ejecuta automáticamente al arrancar el sistema, \n" -"incluso antes de abrir sesión de usuario del sistema. Este servicio puede" -" \n" -"activarse ejecutando \"dpkg-reconfigure i2p\" como root, o " -"usando sudo. \n" -"Esta es la forma recomendada de hacerlo." +"before logging in. The service can be enabled with \"dpkg-reconfigure\n" +"i2p\" as root or using sudo. This is the recommended means of operation." +msgstr "como un servicio que se ejecuta automáticamente al arrancar el sistema, \nincluso antes de abrir sesión de usuario del sistema. Este servicio puede \nactivarse ejecutando \"dpkg-reconfigure i2p\" como root, o usando sudo. \nEsta es la forma recomendada de hacerlo." #: i2p2www/pages/downloads/debian.html:221 msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" -"if you can. The ports to forward can be found on the \n" -"network configuration page in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find portforward.com to be" -" helpful." -msgstr "" -"Si puede, cuando instale por primera vez, recuerde ajustar su " -"NAT/cortafuegos. Los puertos a abrir pueden verse en la web de configuración de la " -"red en la consola del ruter. Si necesita un guía para abrir sus " -"puertos, la web portforward.com " -"puede serle de utilidad." +"When installing for the first time, please remember to adjust your NAT/firewall\n" +"if you can. The ports to forward can be found on the \n" +"network configuration page in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find portforward.com to be helpful." +msgstr "Si puede, cuando instale por primera vez, recuerde ajustar su NAT/cortafuegos. Los puertos a abrir pueden verse en la web de configuración de la red en la consola del ruter. Si necesita un guía para abrir sus puertos, la web portforward.com puede serle de utilidad." #: i2p2www/pages/downloads/debian.html:228 msgid "" "Please review and adjust the bandwidth settings on the\n" "configuration page,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." -msgstr "" -"Por favor revise y ajuste las configuraciones de ancho de banda\n" -"en la página de " -"configuración, ya que los valores por defecto de\n" -"96 KB/s de bajada / 40 KB/s de subida son bastante conservadores. " +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." +msgstr "Por favor revise y ajuste las configuraciones de ancho de banda\nen la página de configuración, ya que los valores por defecto de\n96 KB/s de bajada / 40 KB/s de subida son bastante conservadores. " #: i2p2www/pages/downloads/debian.html:234 #: i2p2www/pages/downloads/post-install.html:34 #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the browser proxy setup page for an easy " -"howto." +"href=\"%(browserconfig)s\">browser proxy setup page for an easy howto." msgstr "" #: i2p2www/pages/downloads/docker.html:5 @@ -761,8 +593,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:7 msgid "" -"If you just want to give I2P a quick try or are using it in a home " -"network, follow these steps" +"If you just want to give I2P a quick try or are using it in a home network, " +"follow these steps" msgstr "" #: i2p2www/pages/downloads/docker.html:9 @@ -786,8 +618,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:24 msgid "" "Note that this quick-start approach is not recommended for production " -"deployments on remote servers. Please read the rest of this document for" -" more information." +"deployments on remote servers. Please read the rest of this document for " +"more information." msgstr "" #: i2p2www/pages/downloads/docker.html:25 @@ -811,8 +643,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnark”) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnark”) " "downloads. See the example below." msgstr "" @@ -833,8 +665,8 @@ msgstr "Puertos" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." msgstr "" #: i2p2www/pages/downloads/docker.html:38 @@ -927,11 +759,10 @@ msgstr "TCP and UDP" #: i2p2www/pages/downloads/docker.html:119 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." msgstr "" #: i2p2www/pages/downloads/docker.html:120 @@ -941,12 +772,11 @@ msgstr "Red" #: i2p2www/pages/downloads/docker.html:121 msgid "" "A best-practices guide for cloud deployments is beyond the scope of this " -"document, but in general you should try to minimize the number of " -"published ports, while exposing only the I2NP ports to the internet. " -"That means that the services in the list above which are bound to " -"127.0.0.1 (which include the router console) will need to be accessed via" -" other methods like ssh tunneling or be manually configured to bind to a " -"different interface." +"document, but in general you should try to minimize the number of published " +"ports, while exposing only the I2NP ports to the internet. That means that " +"the services in the list above which are bound to 127.0.0.1 (which include " +"the router console) will need to be accessed via other methods like ssh " +"tunneling or be manually configured to bind to a different interface." msgstr "" #: i2p2www/pages/downloads/docker.html:122 @@ -956,9 +786,9 @@ msgstr "Ejemplo" #: i2p2www/pages/downloads/docker.html:123 msgid "" "Here is an example container that mounts i2phome as home " -"directory, i2ptorrents for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." +"directory, i2ptorrents for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:6 @@ -969,17 +799,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit The " -"Firefox\n" +"comes bundled with this installer, visit The Firefox\n" "Profile Page." msgstr "" @@ -994,12 +819,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "Gitlab Issue. This is a Windows-only\n" "product." @@ -1012,17 +834,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." msgstr "" @@ -1042,25 +859,18 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:65 @@ -1086,9 +896,7 @@ msgstr "" msgid "" "The files are signed by %(signer)s,\n" "whose key is here." -msgstr "" -"Los ficheros están firmados por %(signer)s,\n" -"cuya clave está aquí." +msgstr "Los ficheros están firmados por %(signer)s,\ncuya clave está aquí." #: i2p2www/pages/downloads/easyinstall.html:85 #: i2p2www/pages/downloads/firefox.html:70 @@ -1104,10 +912,8 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." msgstr "" @@ -1119,32 +925,25 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:101 -#: i2p2www/pages/downloads/firefox.html:86 i2p2www/pages/downloads/mac.html:105 +#: i2p2www/pages/downloads/firefox.html:86 +#: i2p2www/pages/downloads/mac.html:105 msgid "Source Code and Issue Tracking" msgstr "" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the i2p.firefox " -"project." +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the i2p.firefox project." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:107 @@ -1173,11 +972,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:111 #: i2p2www/pages/downloads/firefox.html:96 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." msgstr "" @@ -1189,50 +986,34 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:119 #: i2p2www/pages/downloads/firefox.html:104 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:126 #: i2p2www/pages/downloads/firefox.html:111 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." msgstr "" #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit The Easy Install Bundle Page." msgstr "" @@ -1242,30 +1023,20 @@ msgstr "Perfiles del navegador I2P Firefox" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." msgstr "" #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" @@ -1298,8 +1069,7 @@ msgstr "" #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"I2P Lab\n" +"If you would like to try the latest experimental I2P projects, visit the I2P Lab\n" msgstr "" #: i2p2www/pages/downloads/list.html:19 i2p2www/pages/downloads/list.html:22 @@ -1325,9 +1095,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:39 #, python-format msgid "" -"The default I2P installer requires Java to be installed. You can obtain " -"it from Oracle or from your choice of Java " -"distribution. After installing Java, download the file and double-click\n" +"The default I2P installer requires Java to be installed. You can obtain it from Oracle or from your choice of Java distribution. After installing Java, download the file and double-click\n" " to run it." msgstr "" @@ -1337,10 +1105,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:43 msgid "" -"It is now possible to install all I2P components using a single package " -"(No Java required). To try out the new installer, click " -"below. This bundle can also be used to configure a Firefox Profile. It " -"will not interfere\n" +"It is now possible to install all I2P components using a single package (No Java required). To try out the new installer, click below. This bundle can also be used to configure a Firefox Profile. It will not interfere\n" " with an existing I2P installation if one exists." msgstr "" @@ -1354,8 +1119,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:50 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." msgstr "" #: i2p2www/pages/downloads/list.html:54 i2p2www/pages/downloads/list.html:56 @@ -1365,10 +1130,10 @@ msgstr "" #: i2p2www/pages/downloads/list.html:57 msgid "" -"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard" -" \".dmg\" package type, which allows it to use Apple's built-in tools to " -"securely, reliably, and easily install the package. It does not require " -"Java to be installed." +"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard " +"\".dmg\" package type, which allows it to use Apple's built-in tools to " +"securely, reliably, and easily install the package. It does not require Java" +" to be installed." msgstr "" #: i2p2www/pages/downloads/list.html:64 @@ -1378,14 +1143,9 @@ msgstr "" #: i2p2www/pages/downloads/list.html:66 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" java -jar i2pinstall_%(i2pversion)s.jar. This will " -"launch the GUI installer. Depending on how your computer is set up, you " -"may be able to start the installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file\n" -" or right-clicking the file and selecting "Open with " -"Java". Unfortunately, this behaviour is difficult to predict." +"The most reliable way to launch the installer is from a terminal like this:\n" +" java -jar i2pinstall_%(i2pversion)s.jar. This will launch the GUI installer. Depending on how your computer is set up, you may be able to start the installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file\n" +" or right-clicking the file and selecting "Open with Java". Unfortunately, this behaviour is difficult to predict." msgstr "" #: i2p2www/pages/downloads/list.html:70 @@ -1395,11 +1155,8 @@ msgstr "Instalación desde línea de comandos (sistemas headless):" #: i2p2www/pages/downloads/list.html:71 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially useful for servers, containers, or certain virtual machines. " -"If you wish to use the installer without a GUI, you can use the command\n" -" java -jar i2pinstall_%(i2pversion)s.jar -console to " -"follow the install procedure in your terminal." +"I2P can also be installed in a terminal environment, which may be especially useful for servers, containers, or certain virtual machines. If you wish to use the installer without a GUI, you can use the command\n" +" java -jar i2pinstall_%(i2pversion)s.jar -console to follow the install procedure in your terminal." msgstr "" #: i2p2www/pages/downloads/list.html:74 @@ -1412,12 +1169,8 @@ msgstr "Hay paquetes disponibles para Debian y Ubuntu." #: i2p2www/pages/downloads/list.html:79 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid. However, Debian Buster and Ubuntu " -"Bionic (LTS) distributions will have older I2P versions. If you are not " -"running Debian Sid or the\n" -" latest Ubuntu release, use our Debian repo or Launchpad PPA to " -"ensure you're running the latest I2P version." +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid. However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions. If you are not running Debian Sid or the\n" +" latest Ubuntu release, use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/list.html:83 @@ -1427,9 +1180,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:86 msgid "" "Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed I2P, unfortunately this release fixes some IPC issues which " -"will force you to uninstall your current installation before installing " -"this." +"installed I2P, unfortunately this release fixes some IPC issues which will " +"force you to uninstall your current installation before installing this." msgstr "" #: i2p2www/pages/downloads/list.html:86 @@ -1438,9 +1190,7 @@ msgstr "512 MB de RAM como mínimo; se recomienda 1 GB." #: i2p2www/pages/downloads/list.html:87 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them completely before installing any other " -"version. The apk's from download.i2p2.de\n" +"The releases are not compatible with eachother, as they have different signatures. Uninstall them completely before installing any other version. The apk's from download.i2p2.de\n" " are signed by idk." msgstr "" @@ -1459,28 +1209,23 @@ msgid "docker pull geti2p/i2p" msgstr "" #: i2p2www/pages/downloads/list.html:110 -msgid "Additional instructions for configuring your container can be found here." +msgid "" +"Additional instructions for configuring your container can be found here." msgstr "" #: i2p2www/pages/downloads/list.html:113 #, python-format msgid "" "Alternately,\n" -" you can fetch the source via Git from git.repo.i2p or " -"Github.\n" -"
    Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or" -" headless install as above." +" you can fetch the source via Git from git.repo.i2p or Github.\n" +"
    Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or headless install as above." msgstr "" #: i2p2www/pages/downloads/list.html:116 #, python-format msgid "" -"Android source is also in git on Github. Android\n" -" builds require the I2P source. See the documentation in the " -"Android source for additional build requirements and instructions." +"Android source is also in git on Github. Android\n" +" builds require the I2P source. See the documentation in the Android source for additional build requirements and instructions." msgstr "" #: i2p2www/pages/downloads/list.html:123 @@ -1493,8 +1238,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:124 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "whose key is here." msgstr "" @@ -1504,46 +1248,32 @@ msgstr "Actualizaciones desde versiones anteriores:" #: i2p2www/pages/downloads/list.html:129 msgid "Both automatic and manual upgrades are available for the release." -msgstr "" -"Hay disponibles actualizaciones de cambio de versión manuales y " -"automáticas." +msgstr "Hay disponibles actualizaciones de cambio de versión manuales y automáticas." #: i2p2www/pages/downloads/list.html:132 msgid "" "If you are running 0.7.5 or later, your router should detect the new " -"release. To upgrade simply click the 'Download Update' button on your " -"router console when it appears." +"release. To upgrade simply click the 'Download Update' button on your router" +" console when it appears." msgstr "" #: i2p2www/pages/downloads/list.html:134 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router since 0.9.9. Routers older than 0.9.9 will fail to " -"verify update files signed by str4d, and will need to be manually updated" -" using the process below." -msgstr "" -"Desde la 0.9.23, algunas versiones están firmadas por str4d, cuya clave " -"de firmado ha\n" -"estado en el router I2P desde la 0.9.9. Los routers I2P anteriores a la " -"0.9.9 no podrán\n" -"verificar los ficheros de actualización firmados por str4d, y precisarán " -"ser actualizados\n" -"manualmente usando el procedimiento a continuación." +"Since 0.9.23, some releases are signed by str4d, whose signing key has been " +"in the router since 0.9.9. Routers older than 0.9.9 will fail to verify " +"update files signed by str4d, and will need to be manually updated using the" +" process below." +msgstr "Desde la 0.9.23, algunas versiones están firmadas por str4d, cuya clave de firmado ha\nestado en el router I2P desde la 0.9.9. Los routers I2P anteriores a la 0.9.9 no podrán\nverificar los ficheros de actualización firmados por str4d, y precisarán ser actualizados\nmanualmente usando el procedimiento a continuación." #: i2p2www/pages/downloads/list.html:140 msgid "" -"Download the file to your I2P installation directory and rename as " -"i2pupdate.zip. (alternately, you can get the source as above and run " -"\"ant updater\", then copy the resulting i2pupdate.zip to your I2P " -"installation directory).\n" +"Download the file to your I2P installation directory and rename as i2pupdate.zip. (alternately, you can get the source as above and run \"ant updater\", then copy the resulting i2pupdate.zip to your I2P installation directory).\n" " You do NOT need to unzip the file." msgstr "" #: i2p2www/pages/downloads/list.html:144 msgid "Click \"Restart\"" -msgstr "" -"Pulse \"Reiniciar\"" +msgstr "Pulse \"Reiniciar\"" #: i2p2www/pages/downloads/list.html:147 msgid "Grab a cup of coffee and come back in 11 minutes" @@ -1554,9 +1284,7 @@ msgstr "Vaya a por una taza de horchata/café/cacao/mate y vuelva en 11 minutos" msgid "" "The file is signed by %(signer)s,\n" "whose key is here." -msgstr "" -"El fichero está firmado por %(signer)s,\n" -"cuya clave está aquí." +msgstr "El fichero está firmado por %(signer)s,\ncuya clave está aquí." #: i2p2www/pages/downloads/list.html:153 msgid "Previous Releases" @@ -1566,16 +1294,10 @@ msgstr "Versiones anteriores" #, python-format msgid "" "Previous releases are available on Google " -"Code and Launchpad " -"and within the I2P network on %(echelon)s." -msgstr "" -"Las versiones anteriores están disponibles en Google " -"Code y \n" -"Launchpad, y dentro de la" -" red I2P en %(echelon)s." +"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code " +"and Launchpad and within the" +" I2P network on %(echelon)s." +msgstr "Las versiones anteriores están disponibles en Google Code y \nLaunchpad, y dentro de la red I2P en %(echelon)s." #: i2p2www/pages/downloads/mac.html:6 msgid "Mac OS Easy Install Bundle" @@ -1583,53 +1305,38 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG-based bundle for Mac OS. It installs " -"and behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG-based bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" #: i2p2www/pages/downloads/mac.html:13 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:22 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on the browser configuration\n" "page." msgstr "" #: i2p2www/pages/downloads/mac.html:29 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" @@ -1639,10 +1346,8 @@ msgstr "Instrucciones" #: i2p2www/pages/downloads/mac.html:79 msgid "" -"Download the appropriate file for your Mac hardware and double-click on " -"it. Accept the License Agreement, then\n" -"drag the I2P icon on top of the Applications " -"icon.\n" +"Download the appropriate file for your Mac hardware and double-click on it. Accept the License Agreement, then\n" +"drag the I2P icon on top of the Applications icon.\n" "Launch I2P from Finder." msgstr "" @@ -1653,8 +1358,8 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:86 msgid "" "If you own an Apple silicon Mac and have previously installed the Intel " -"bundle on it you need to change the update configuration to make sure the" -" next I2P update does not revert your bundle to Intel." +"bundle on it you need to change the update configuration to make sure the " +"next I2P update does not revert your bundle to Intel." msgstr "" #: i2p2www/pages/downloads/mac.html:90 @@ -1671,18 +1376,14 @@ msgstr "Limitaciones" #: i2p2www/pages/downloads/mac.html:100 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:106 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1690,88 +1391,45 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the router console,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the router console,\n" "which has further instructions." -msgstr "" -"Después de ejecutar el instalador en Windows simplemente pulse en el " -"botón \n" -"\"Iniciar I2P\" que abrirá la consola del router I2P, \n" -"donde encontrará más instrucciones." +msgstr "Después de ejecutar el instalador en Windows simplemente pulse en el botón \n\"Iniciar I2P\" que abrirá la consola del router I2P, \ndonde encontrará más instrucciones." #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The router console\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The router console\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." -msgstr "" -"En sistemas tipo-Unix, I2P puede ser ejecutado como un servicio usando \n" -"el script \"i2prouter\" ubicado en el directorio seleccionado para I2P.\n" -"En un terminal, llendo a ese directorio y ejecutando \"sh i2prouter " -"status\" debería \n" -"mostrarle el estado del router I2P. Los argumentos \"start\", \"stop\" y " -"\"restart\" \n" -"controlan el servicio. A la consola del router se puede " -"acceder en su \n" -"ubicación habitual. Para usuarios de OpenSolaris y otros sistemas para " -"los que \n" -"no está soportado el wrapper (i2psvc, encapsulador como servicio para " -"Java), ejecute el router I2P con \"sh runplain.sh\" en lugar del " -"anterior." +msgstr "En sistemas tipo-Unix, I2P puede ser ejecutado como un servicio usando \nel script \"i2prouter\" ubicado en el directorio seleccionado para I2P.\nEn un terminal, llendo a ese directorio y ejecutando \"sh i2prouter status\" debería \nmostrarle el estado del router I2P. Los argumentos \"start\", \"stop\" y \"restart\" \ncontrolan el servicio. A la consola del router se puede acceder en su \nubicación habitual. Para usuarios de OpenSolaris y otros sistemas para los que \nno está soportado el wrapper (i2psvc, encapsulador como servicio para Java), ejecute el router I2P con \"sh runplain.sh\" en lugar del anterior." #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" +"When installing for the first time, please remember to adjust your NAT/firewall\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "described here among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "configuration page." -msgstr "" -"Cuando instale I2P por primera vez, por favor recuerde ajustar su \n" -"NAT/cortafuegos sin olvidarse de los puertos que I2P usa para " -"Internet, \n" -"descritos aquí. Si ha abierto con éxito su " -"puerto TCP de entrada en su \n" -"NAT/cortafuegos, habilítelo también en la página de configuración." +msgstr "Cuando instale I2P por primera vez, por favor recuerde ajustar su \nNAT/cortafuegos sin olvidarse de los puertos que I2P usa para Internet, \ndescritos aquí. Si ha abierto con éxito su puerto TCP de entrada en su \nNAT/cortafuegos, habilítelo también en la página de configuración." #: i2p2www/pages/downloads/post-install.html:28 msgid "" "Also, please review and adjust the bandwidth settings on the\n" "configuration page,\n" "as the default settings of 96 KBps down / 40 KBps up are fairly slow." -msgstr "" -"Además, por favor revise y ajuste su configuración de ancho de " -"banda \n" -"en la página de " -"configuración, \n" -"ya que la configuración por defecto de 96 KBps de bajada / 40 KBps de " -"subida \n" -"es bastante lenta." +msgstr "Además, por favor revise y ajuste su configuración de ancho de banda \nen la página de configuración, \nya que la configuración por defecto de 96 KBps de bajada / 40 KBps de subida \nes bastante lenta." #: i2p2www/pages/downloads/redirect.html:2 msgid "Downloading..." @@ -1782,9 +1440,7 @@ msgstr "Descargando..." msgid "" "Your download will begin shortly. If it doesn't start within 5 seconds, " "click here." -msgstr "" -"Su descarga comenzará en breve. Si no comienza en 5 segundos, haga clic " -"aquí." +msgstr "Su descarga comenzará en breve. Si no comienza en 5 segundos, haga clic aquí." #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4 msgid "Mirror selection" @@ -1806,12 +1462,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -1821,12 +1474,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." msgstr "" #: i2p2www/pages/downloads/windows.html:18 @@ -1859,10 +1509,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" msgstr "" @@ -1872,15 +1520,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" msgstr "" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." msgstr "" @@ -1890,15 +1536,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." msgstr "" #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." msgstr "" @@ -1923,7 +1567,8 @@ msgid "https://geti2p.net" msgstr "" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "" #: i2p2www/pages/downloads/windows.html:83 @@ -1932,22 +1577,19 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." msgstr "" #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." msgstr "" #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." msgstr "" @@ -1957,8 +1599,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." msgstr "" #: i2p2www/pages/downloads/windows.html:109 @@ -1967,18 +1609,15 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." msgstr "" #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." msgstr "" @@ -2008,10 +1647,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." msgstr "" #: i2p2www/pages/downloads/windows.html:147 @@ -2024,8 +1661,7 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." msgstr "" @@ -2044,22 +1680,20 @@ msgid "Here we have an overview of the applications." msgstr "" #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." msgstr "" #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the router console homepage to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the router console homepage to\n" "get started." msgstr "" @@ -2069,11 +1703,9 @@ msgstr "No encontrado" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." -msgstr "" -"Lo que estaba buscando... se llama de otra forma, no existe o ha sido " -"borrado." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." +msgstr "Lo que estaba buscando... se llama de otra forma, no existe o ha sido borrado." #: i2p2www/pages/global/error_500.html:5 msgid "Server error" @@ -2137,9 +1769,7 @@ msgstr "El Proyecto de Internet Invisible" msgid "" "This page was last updated in %(lastupdated)s and is accurate for router " "version %(accuratefor)s." -msgstr "" -"Esta página fue actualizada por última vez el %(lastupdated)s y es " -"precisa con la versión %(accuratefor)s del router I2P." +msgstr "Esta página fue actualizada por última vez el %(lastupdated)s y es precisa con la versión %(accuratefor)s del router I2P." #: i2p2www/pages/global/layout.html:84 #, python-format @@ -2482,29 +2112,18 @@ msgstr "ATOM feed de las reuniones de I2P" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "the meetings forum." -msgstr "" -"Las reuniones del proyecto programadas regularmente se efectúan el primer" -" martes de cada mes a las 8 PM UTC.\n" -"Cualquiera puede programar y\n" -"convocar una reunión, publicando el orden del día en\n" -"el foro de reuniones." +msgstr "Las reuniones del proyecto programadas regularmente se efectúan el primer martes de cada mes a las 8 PM UTC.\nCualquiera puede programar y\nconvocar una reunión, publicando el orden del día en\nel foro de reuniones." #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"Status updates from developers are also " -"available." -msgstr "" -"Si tiene algo que discutir por favor busque a los desarrolladores en " -"#i2p-dev en el IRC. Las actualizaciones del " -"estado de los desarrolladores también están disponibles." +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"Status updates from developers are also available." +msgstr "Si tiene algo que discutir por favor busque a los desarrolladores en #i2p-dev en el IRC. Las actualizaciones del estado de los desarrolladores también están disponibles." #: i2p2www/pages/meetings/show.html:2 #, python-format @@ -2536,23 +2155,14 @@ msgid "" "BibTeX source page for examples.
    \n" "Remember to include URLs if possible:\n" "offline papers are less useful." -msgstr "" -"Por favor, envíe las entradas nuevas o corregidas a\n" -"%(email)s.
    \n" -"Si puede, use el formato BibTeX; vea our\n" -"BibTeX source page for examples.
    \n" -"Recuerde incluir las URLs si es posible:\n" -"offline papers are less useful." +msgstr "Por favor, envíe las entradas nuevas o corregidas a\n%(email)s.
    \nSi puede, use el formato BibTeX; vea our\nBibTeX source page for examples.
    \nRecuerde incluir las URLs si es posible:\noffline papers are less useful." #: i2p2www/pages/papers/list.html:80 #, python-format msgid "" "The source code for this page was adapted from\n" "Free Haven's anonymity bibliography." -msgstr "" -"El código fuente para esta página fue adaptado desde la \n" -"bibliografía de anonimato del proyecto Free " -"Haven." +msgstr "El código fuente para esta página fue adaptado desde la \nbibliografía de anonimato del proyecto Free Haven." #: i2p2www/pages/site/contact.html:4 msgid "Email" @@ -2562,11 +2172,7 @@ msgstr "Correo electrónico" msgid "" "Please do not use these email addresses for support requests.\n" "For contact specific to research, outreach and security please use:" -msgstr "" -"No utilice estas direcciones de correo electrónico para solicitudes de " -"soporte.\n" -"Para contactos específicos de investigación, divulgación y seguridad, " -"utilice:" +msgstr "No utilice estas direcciones de correo electrónico para solicitudes de soporte.\nPara contactos específicos de investigación, divulgación y seguridad, utilice:" #: i2p2www/pages/site/contact.html:24 msgid "Please visit our I2P user forum -" @@ -2576,17 +2182,15 @@ msgstr "Visite nuestro foro de usuarios de I2P -" msgid "" "available on non-private internet at https://i2pforum.net and on I2P at " "http://i2pforum.i2p" -msgstr "" -"disponible en Internet no privada en https://i2pforum.net y en I2P en " -"http://i2pforum.i2p" +msgstr "disponible en Internet no privada en https://i2pforum.net y en I2P en http://i2pforum.i2p" #: i2p2www/pages/site/contact.html:26 #, python-format msgid "" "Most of the discussion about I2P's development happens on the I2P developer forum (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." +"href=\"http://%(zzz)s\">I2P developer forum (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." msgstr "" #: i2p2www/pages/site/contact.html:30 @@ -2596,42 +2200,19 @@ msgstr "Los redes sociales" #: i2p2www/pages/site/contact.html:32 msgid "" "" -msgstr "" -"" +msgstr "" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like OFTC,\n" -" EIN and Freenode.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." -msgstr "" -"Nuestra red IRC principal es la red Irc2P dentro de I2P; tras la " -"instalación inicial de I2P ya hay creado por defecto un túnel a esta red." -" Estamos presentes también en múltiples redes como OFTC, EIN y Freenode. Todos los canales " -"relacionados con I2P en esas redes están unidos a los canales principales" -" de Irc2P a través de 'relay bots'." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like OFTC,\n" +" EIN and Freenode.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." +msgstr "Nuestra red IRC principal es la red Irc2P dentro de I2P; tras la instalación inicial de I2P ya hay creado por defecto un túnel a esta red. Estamos presentes también en múltiples redes como OFTC, EIN y Freenode. Todos los canales relacionados con I2P en esas redes están unidos a los canales principales de Irc2P a través de 'relay bots'." #: i2p2www/pages/site/contact.html:49 msgid "Channel list:" @@ -2655,9 +2236,7 @@ msgstr "Listas de correo" #: i2p2www/pages/site/contact.html:58 msgid "I2P has no active mailing lists, however archives can be accessed." -msgstr "" -"I2P no tiene listas de correo activas, pero se puede acceder a los " -"archivos." +msgstr "I2P no tiene listas de correo activas, pero se puede acceder a los archivos." #: i2p2www/pages/site/contact.html:62 msgid "Lists" @@ -2670,17 +2249,13 @@ msgstr "Archivo" #: i2p2www/pages/site/contact.html:67 msgid "I2P developer discussions - anything related to development of I2P" -msgstr "" -"Discusiones de desarrolladores de I2P - cualquier cosa relacionada con el" -" desarrollo de I2P" +msgstr "Discusiones de desarrolladores de I2P - cualquier cosa relacionada con el desarrollo de I2P" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" -msgstr "" -"Discusión general sobre I2P - cualquier cosa que no encaje en el resto de" -" las listas va aquí" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" +msgstr "Discusión general sobre I2P - cualquier cosa que no encaje en el resto de las listas va aquí" #: i2p2www/pages/site/contact.html:80 msgid "Team" @@ -2808,9 +2383,7 @@ msgstr "Administrador de CI" #: i2p2www/pages/site/contact.html:151 msgid "Maintain the Continuous Integration infrastructure" -msgstr "" -"Mantiene la infraestructura de integración continua (Continuous " -"Integration)" +msgstr "Mantiene la infraestructura de integración continua (Continuous Integration)" #: i2p2www/pages/site/contact.html:154 msgid "Reseed admin" @@ -2853,10 +2426,9 @@ msgid "Product Development" msgstr "Desarrollo del producto" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" -msgstr "" -"supervisa los proyectos desde las primeras etapas de planificación hasta " -"la finalización del proyecto" +msgid "" +"supervises projects from the early planning stages to project completion" +msgstr "supervisa los proyectos desde las primeras etapas de planificación hasta la finalización del proyecto" #: i2p2www/pages/site/contact.html:189 msgid "Website Maintainer" @@ -2906,9 +2478,7 @@ msgstr "Diseño y usabilidad" #: i2p2www/pages/site/contact.html:216 msgid "ongoing improvements to user experience for website and software" -msgstr "" -"mejoras continuas de la experiencia del usuario en el sitio web y los " -"programas informáticos" +msgstr "mejoras continuas de la experiencia del usuario en el sitio web y los programas informáticos" #: i2p2www/pages/site/contact.html:234 msgid "Director of passion" @@ -3028,9 +2598,7 @@ msgstr "Encargado de los paquetes para Debian/Ubuntu y del PPA" #: i2p2www/pages/site/contact.html:306 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web," -" y trabajos en los unit tests" +msgstr "Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web, y trabajos en los unit tests" #: i2p2www/pages/site/contact.html:311 msgid "Help needed on many fronts!" @@ -3110,10 +2678,9 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "desarrollo de jbigi, migración de la wiki, limpieza de la documentación" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" -msgstr "" -"depuración de java y desarrollo del cliente en I2PTunnel y en la consola " -"del ruter" +msgid "" +"java debugging and client development on I2PTunnel and the router console" +msgstr "depuración de java y desarrollo del cliente en I2PTunnel y en la consola del ruter" #: i2p2www/pages/site/contact.html:397 msgid "SAM perl module" @@ -3165,28 +2732,12 @@ msgstr "Inclusión" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.
    \n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.
    \n" "We disgrace hate, anger, racism, and bad speaking towards anyone.
    \n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.
    \n" -"We work together to build a free world without hate, racism and " -"violence.
    \n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." -msgstr "" -"I2P da la bienvenida a todo tipo de personas, siempre y cuando sean " -"amables y se ayuden mutuamente.
    \n" -"Rechazamos el odio, la ira, el racismo y las malas palabras hacia " -"cualquier persona.
    \n" -"Apoyamos a los LBGT, a las minorías oprimidas y a otras personas, tanto " -"si necesitan ayuda como si no.
    \n" -"Trabajamos juntos para construir un mundo libre sin odio, racismo ni " -"violencia.
    \n" -"El software del router I2P se creó con este espíritu y debe utilizarse " -"para ayudar a las personas reprimidas a recuperar su libertad de " -"expresión, sin reprimir a los demás." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.
    \n" +"We work together to build a free world without hate, racism and violence.
    \n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." +msgstr "I2P da la bienvenida a todo tipo de personas, siempre y cuando sean amables y se ayuden mutuamente.
    \nRechazamos el odio, la ira, el racismo y las malas palabras hacia cualquier persona.
    \nApoyamos a los LBGT, a las minorías oprimidas y a otras personas, tanto si necesitan ayuda como si no.
    \nTrabajamos juntos para construir un mundo libre sin odio, racismo ni violencia.
    \nEl software del router I2P se creó con este espíritu y debe utilizarse para ayudar a las personas reprimidas a recuperar su libertad de expresión, sin reprimir a los demás." #: i2p2www/pages/site/faq.html:2 msgid "Frequently Asked Questions" @@ -3206,11 +2757,8 @@ msgstr "¿Se requiere instalar Java para usar I2P?" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" -msgstr "" -"¿Qué es un \"Sitio I2P\" y cómo configuro mi navegador para poder " -"utilizarlos?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" +msgstr "¿Qué es un \"Sitio I2P\" y cómo configuro mi navegador para poder utilizarlos?" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 msgid "What do the Active x/y numbers mean in the router console?" @@ -3223,11 +2771,9 @@ msgstr "Mi router tiene muy pocos pares ('peers') activos, ¿está bien esto?" #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" -msgstr "" -"Estoy en contra de ciertos tipos de contenido. ¿Cómo evito almacenarlos, " -"distribuirlos o acceder a ellos?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" +msgstr "Estoy en contra de ciertos tipos de contenido. ¿Cómo evito almacenarlos, distribuirlos o acceder a ellos?" #: i2p2www/pages/site/faq.html:14 msgid "Is it possible to block I2P?" @@ -3237,11 +2783,7 @@ msgstr "¿Es posible bloquear I2P?" msgid "" "In wrapper.log I see an error stating Protocol family " "unavailable when I2P is loading" -msgstr "" -"En wrapper.log (registro del encasulador como servicio para " -"Java) veo un error indicando Protocol family unavailable " -"(familia de protocolos no disponible) ocurrido cuando I2P estaba " -"cargandose. " +msgstr "En wrapper.log (registro del encasulador como servicio para Java) veo un error indicando Protocol family unavailable (familia de protocolos no disponible) ocurrido cuando I2P estaba cargandose. " #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189 msgid "Most of the I2P Sites within I2P are down?" @@ -3267,9 +2809,7 @@ msgstr "¿Cómo puedo crear mi propio sitio I2P?" msgid "" "If I host a website at I2P at home, containing only HTML and CSS, is it " "dangerous?" -msgstr "" -"Si alojo un sitio web en I2P en casa, que sólo contenga HTML y CSS, ¿es " -"peligroso?" +msgstr "Si alojo un sitio web en I2P en casa, que sólo contenga HTML y CSS, ¿es peligroso?" #: i2p2www/pages/site/faq.html:25 msgid "How Does I2P find \".i2p\" websites?" @@ -3287,17 +2827,13 @@ msgstr "¿Qué puertos usa I2P?" msgid "" "I'm missing lots of hosts in my address book. What are some good " "subscription links?" -msgstr "" -"Me faltan muchos anfitriones en mi libreta de direcciones. ¿Cuáles son " -"algunos buenos enlaces de suscripción?" +msgstr "Me faltan muchos anfitriones en mi libreta de direcciones. ¿Cuáles son algunos buenos enlaces de suscripción?" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" -msgstr "" -"¿Cómo puedo acceder a la consola web desde máquinas remotas y cómo la " -"protejo con contraseña?" +"How can I access the web console from my other machines or password protect " +"it?" +msgstr "¿Cómo puedo acceder a la consola web desde máquinas remotas y cómo la protejo con contraseña?" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 msgid "How can I use applications from my other machines?" @@ -3309,8 +2845,7 @@ msgstr "¿Es posible usar I2P como un proxy SOCKS?" #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" msgstr "¿Cómo accedo al IRC, Bittorrent u otros servicios en la Internet regular?" #: i2p2www/pages/site/faq.html:34 @@ -3321,9 +2856,7 @@ msgstr "" msgid "" "My router has been up for several minutes and has zero or very few " "connections" -msgstr "" -"Mi router ha estado activo durante varios minutos y aún tiene ninguna o " -"muy pocas conexiones" +msgstr "Mi router ha estado activo durante varios minutos y aún tiene ninguna o muy pocas conexiones" #: i2p2www/pages/site/faq.html:37 i2p2www/pages/site/faq.html:763 msgid "How do I reseed manually?" @@ -3337,9 +2870,7 @@ msgstr "Privacidad-Seguridad" msgid "" "Is my router an \"exit node\"(outproxy) to the regular Internet? I don't " "want it to be." -msgstr "" -"¿Es mi router un \"nodo de salida\" (outproxy) hacia la Internet regular?" -" No quiero que lo sea." +msgstr "¿Es mi router un \"nodo de salida\" (outproxy) hacia la Internet regular? No quiero que lo sea." #: i2p2www/pages/site/faq.html:42 i2p2www/pages/site/faq.html:695 msgid "Is it easy to detect the use of I2P by analyzing network traffic?" @@ -3351,11 +2882,9 @@ msgstr "¿Es seguro utilizar I2P?" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"Veo las direcciones IP de todos los demás nodos I2P en la consola del " -"router. ¿Significa eso que mi dirección IP es visible por los demás?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "Veo las direcciones IP de todos los demás nodos I2P en la consola del router. ¿Significa eso que mi dirección IP es visible por los demás?" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 msgid "Is using an outproxy safe?" @@ -3381,18 +2910,13 @@ msgstr "¿Por qué mi router utiliza demasiada CPU?" msgid "" "My active peers / known peers / participating tunnels / connections / " "bandwidth vary dramatically over time! Is anything wrong?" -msgstr "" -"¡Mis pares activos / pares conocidos / túneles participantes / conexiones" -" / ancho de banda, varían dramáticamente a lo largo del tiempo! ¿Está mal" -" algo?" +msgstr "¡Mis pares activos / pares conocidos / túneles participantes / conexiones / ancho de banda, varían dramáticamente a lo largo del tiempo! ¿Está mal algo?" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" -msgstr "" -"¿Qué hace que las descargas, los torrents, la navegación web y todo lo " -"demás sea más lento en I2P en comparación con Internet normal?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" +msgstr "¿Qué hace que las descargas, los torrents, la navegación web y todo lo demás sea más lento en I2P en comparación con Internet normal?" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 msgid "I think I found a bug, where can I report it?" @@ -3405,41 +2929,31 @@ msgstr "¡Tengo una pregunta!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the Java programming language." -" \n" +"I2P is written in the Java programming language. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An Android port is also available." msgstr "" #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." msgstr "" #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the Raspberry Pi range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the Raspberry Pi range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." msgstr "" #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "%(chart)s.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." @@ -3448,13 +2962,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "alternative clients which don't require Java." -msgstr "" -"Aunque la principal implementación de cliente I2P requiere Java, hay\n" -"varios clientes alternativos que no requieren " -"Java." +msgstr "Aunque la principal implementación de cliente I2P requiere Java, hay\nvarios clientes alternativos que no requieren Java." #: i2p2www/pages/site/faq.html:101 msgid "What is an \"I2P Site?\"" @@ -3463,36 +2973,22 @@ msgstr "" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the browser configuration page." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the browser configuration page." msgstr "" #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." msgstr "" #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" msgstr "" @@ -3500,93 +2996,54 @@ msgstr "" #: i2p2www/pages/site/faq.html:129 msgid "" "Distribution
    \n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route any traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route any traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." msgstr "" #: i2p2www/pages/site/faq.html:139 msgid "" "Storage
    \n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, Freenet.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, Freenet.\n" "By running I2P, you are not storing content for anyone." msgstr "" #: i2p2www/pages/site/faq.html:147 msgid "" "Access
    \n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." -msgstr "" -"Acceso
    \n" -"Si hay servicios ocultos que no le gustan, puede abstenerse de " -"visitarlos.\n" -"Su router no solicitará ningún contenido sin que usted se lo indique " -"expresamente." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." +msgstr "Acceso
    \nSi hay servicios ocultos que no le gustan, puede abstenerse de visitarlos.\nSu router no solicitará ningún contenido sin que usted se lo indique expresamente." #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." -msgstr "" -"Sí, con mucho, la forma más fácil y más común es mediante el bloqueo de " -"bootstrap, o \"Reseed\" de servidores. Bloquear completamente todo el " -"tráfico ofuscado\n" -"también funcionaría (aunque rompería muchas, muchas otras cosas que no " -"son I2P y la mayoría no están dispuestos a ir tan lejos).\n" -"En el caso del bloqueo de reseed, hay un paquete de reseed en Github, " -"bloquearlo también bloqueará Github.\n" -"Puedes hacer reseed a través de un proxy (se pueden encontrar muchos en " -"Internet si no quieres usar Tor) o compartir paquetes de reseed de amigo " -"a amigo sin conexión." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." +msgstr "Sí, con mucho, la forma más fácil y más común es mediante el bloqueo de bootstrap, o \"Reseed\" de servidores. Bloquear completamente todo el tráfico ofuscado\ntambién funcionaría (aunque rompería muchas, muchas otras cosas que no son I2P y la mayoría no están dispuestos a ir tan lejos).\nEn el caso del bloqueo de reseed, hay un paquete de reseed en Github, bloquearlo también bloqueará Github.\nPuedes hacer reseed a través de un proxy (se pueden encontrar muchos en Internet si no quieres usar Tor) o compartir paquetes de reseed de amigo a amigo sin conexión." #: i2p2www/pages/site/faq.html:161 msgid "" "In wrapper.log I see an error that states \"Protocol " "family unavailable\" when loading the Router Console" -msgstr "" -"En el archivo wrapper.log veo un error que indica " -"\"Protocol family unavailable\" cuando arranco la consola " -"del ruter." +msgstr "En el archivo wrapper.log veo un error que indica \"Protocol family unavailable\" cuando arranco la consola del ruter." #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" -msgstr "" -"A menudo este error ocurre con cualquier aplicación java que active la " -"red en sistemas configurados para usar IPV6 por defecto. Hay varias " -"formas de arreglarlo:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" +msgstr "A menudo este error ocurre con cualquier aplicación java que active la red en sistemas configurados para usar IPV6 por defecto. Hay varias formas de arreglarlo:" #: i2p2www/pages/site/faq.html:168 msgid "" "On Linux based systems, you can echo 0 > " "/proc/sys/net/ipv6/bindv6only" -msgstr "" -"En sistemas basados en Linux puede ejecutar echo 0 > " -"/proc/sys/net/ipv6/bindv6only" +msgstr "En sistemas basados en Linux puede ejecutar echo 0 > /proc/sys/net/ipv6/bindv6only" #: i2p2www/pages/site/faq.html:170 msgid "Look for the following lines in wrapper.config." @@ -3594,42 +3051,30 @@ msgstr "Busque por las siguientes líneas en wrapper.config." #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." -msgstr "" -"Si las líneas ya están ahí, descomentelas eliminando los \"#\". Si las " -"líneas no están ahí añádalas sin los \"#\"." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." +msgstr "Si las líneas ya están ahí, descomentelas eliminando los \"#\". Si las líneas no están ahí añádalas sin los \"#\"." #: i2p2www/pages/site/faq.html:177 msgid "" "Another option would be to remove the ::1 from " "~/.i2p/clients.config" -msgstr "" -"Otra opción sería borrar ::1 del archivo " -"~/.i2p/clients.config" +msgstr "Otra opción sería borrar ::1 del archivo ~/.i2p/clients.config" #: i2p2www/pages/site/faq.html:181 msgid "" -"WARNING: For any changes to wrapper.config " -"to take effect, you must completely\n" +"WARNING: For any changes to wrapper.config to take effect, you must completely\n" "stop the router and the wrapper. Clicking Restart on your\n" "router console will NOT reread this file! You must\n" "click Shutdown, wait 11 minutes, then start I2P." -msgstr "" -"CUIDADO: Para que los cambios en " -"wrapper.config tengan efecto debe apagar completamente el " -"ruter y el wrapper. ¡Pulsando Reiniciar en la consola del ruter " -"NO leerá de nuevo este archivo! Tiene que pulsar apagar, " -"esperar 11 minutos y entonces arrancar I2P." +msgstr "CUIDADO: Para que los cambios en wrapper.config tengan efecto debe apagar completamente el ruter y el wrapper. ¡Pulsando Reiniciar en la consola del ruter NO leerá de nuevo este archivo! Tiene que pulsar apagar, esperar 11 minutos y entonces arrancar I2P." #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "%(eepstatus)s tracks active I2P Sites." msgstr "" @@ -3639,94 +3084,49 @@ msgstr "¿Porqué está escuchando I2P en el puerto 32000?" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." -msgstr "" -"El Tanuki java service wrapper que utilizamos abre este puerto " -"—vinculado a localhost— con el fin de comunicarse con el " -"software que se ejecuta dentro de la JVM. \n" -"Cuando se lanza la JVM se le da una clave para que pueda conectarse a la " -"envoltura. \n" -"Después de que la JVM establece su conexión con la envoltura, ésta " -"rechaza cualquier conexión adicional." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." +msgstr "El Tanuki java service wrapper que utilizamos abre este puerto —vinculado a localhost— con el fin de comunicarse con el software que se ejecuta dentro de la JVM. \nCuando se lanza la JVM se le da una clave para que pueda conectarse a la envoltura. \nDespués de que la JVM establece su conexión con la envoltura, ésta rechaza cualquier conexión adicional." #: i2p2www/pages/site/faq.html:206 msgid "" "More information can be found in the wrapper documentation." -msgstr "" -"Encontrará más información en la documentación sobre envoltorios." +msgstr "Encontrará más información en la documentación sobre envoltorios." #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a separate page with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." +"The proxy config for different browsers is on a separate page with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." msgstr "" #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the I2PTunnel " -"configuration page), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to localhost " -"6668. \n" -"HexChat-like client users can create a new network with the server " -"localhost/6668 (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the I2PTunnel configuration page), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to localhost 6668. \n" +"HexChat-like client users can create a new network with the server localhost/6668 (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" msgstr "" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the Website link at the " -"top of your router console for instructions." -msgstr "" -"Pulse en el enlace a la página web" -" en la parte de arriba de las instrucciones de la consola del ruter." +"Click on the Website link at the top " +"of your router console for instructions." +msgstr "Pulse en el enlace a la página web en la parte de arriba de las instrucciones de la consola del ruter." #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." -msgstr "" -"Si alojas un blog personal o haces algo que no sea sensible, obviamente " -"corres poco peligro.\n" -"Si tienes necesidades de privacidad que básicamente no son específicas, " -"corres poco peligro. Si estás alojando algo sensible, entonces\n" -"tus servicios se caerán al mismo tiempo que tu router. Alguien que " -"observe su tiempo de inactividad y lo correlacione con\n" -"eventos del mundo real probablemente podría desanonimizarte con " -"suficiente esfuerzo. I2P tiene defensas disponibles contra esto como " -"multihoming o\n" -"Tahoe-LAFS, pero requieren una configuración adicional y sólo son " -"apropiadas para algunos modelos de amenaza. No existe una solución " -"mágica.\n" -"protegerse de una amenaza real requerirá una consideración real en " -"cualquier caso." +msgstr "Si alojas un blog personal o haces algo que no sea sensible, obviamente corres poco peligro.\nSi tienes necesidades de privacidad que básicamente no son específicas, corres poco peligro. Si estás alojando algo sensible, entonces\ntus servicios se caerán al mismo tiempo que tu router. Alguien que observe su tiempo de inactividad y lo correlacione con\neventos del mundo real probablemente podría desanonimizarte con suficiente esfuerzo. I2P tiene defensas disponibles contra esto como multihoming o\nTahoe-LAFS, pero requieren una configuración adicional y sólo son apropiadas para algunos modelos de amenaza. No existe una solución mágica.\nprotegerse de una amenaza real requerirá una consideración real en cualquier caso." #: i2p2www/pages/site/faq.html:250 msgid "How Does I2P find \".i2p\" websites? " @@ -3738,38 +3138,24 @@ msgstr "¿Cómo añado direcciones a la Agenda? " #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." -msgstr "" -"No puede añadir una dirección sin conocer al menos el base32 o el base64 " -"del sitio que desea visitar. El \"nombre de host\" que es legible por " -"humanos es sólo un alias para la dirección criptográfica, que corresponde" -" a base32 o base64. Sin la dirección criptográfica, no hay manera de " -"acceder a un sitio I2P, esto es por diseño. Distribuir la dirección a las" -" personas que aún no la conocen suele ser responsabilidad del proveedor " -"del servicio Jump. Visitar un Sitio I2P que es desconocido activará el " -"uso de un servicio Jump. stats.i2p es el servicio Jump más fiable." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." +msgstr "No puede añadir una dirección sin conocer al menos el base32 o el base64 del sitio que desea visitar. El \"nombre de host\" que es legible por humanos es sólo un alias para la dirección criptográfica, que corresponde a base32 o base64. Sin la dirección criptográfica, no hay manera de acceder a un sitio I2P, esto es por diseño. Distribuir la dirección a las personas que aún no la conocen suele ser responsabilidad del proveedor del servicio Jump. Visitar un Sitio I2P que es desconocido activará el uso de un servicio Jump. stats.i2p es el servicio Jump más fiable." #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." -msgstr "" -"Si estás alojando un sitio a través de i2ptunnel, entonces todavía no " -"tendrá un registro con un servicio de salto. Para darle una URL " -"localmente, entonces visita la página de configuración y haz clic en el " -"botón que dice \"Añadir a la libreta de direcciones local\". A " -"continuación, vaya a http://127.0.0.1:7657/dns para buscar la URL de " -"addresshelper y compártala." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." +msgstr "Si estás alojando un sitio a través de i2ptunnel, entonces todavía no tendrá un registro con un servicio de salto. Para darle una URL localmente, entonces visita la página de configuración y haz clic en el botón que dice \"Añadir a la libreta de direcciones local\". A continuación, vaya a http://127.0.0.1:7657/dns para buscar la URL de addresshelper y compártala." #: i2p2www/pages/site/faq.html:261 msgid "The ports that are used by I2P can be divided into 2 sections:" @@ -3779,9 +3165,7 @@ msgstr "Los puertos que utiliza I2P pueden dividirse en 2 secciones:" msgid "" "Internet-facing ports, which are used for communication with other I2P " "routers" -msgstr "" -"Puertos orientados a Internet, que se utilizan para la comunicación con " -"otros routers I2P" +msgstr "Puertos orientados a Internet, que se utilizan para la comunicación con otros routers I2P" #: i2p2www/pages/site/faq.html:267 msgid "Local ports, for local connections" @@ -3793,12 +3177,9 @@ msgstr "A continuación se describen detalladamente." #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports
    Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router configuration page." +"Internet-facing ports
    Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router configuration page." msgstr "" #: i2p2www/pages/site/faq.html:278 @@ -3808,8 +3189,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the configuration page to " -"arbitrary remote UDP ports, allowing for replies" +"href=\"http://127.0.0.1:7657/confignet\">configuration page to arbitrary" +" remote UDP ports, allowing for replies" msgstr "" #: i2p2www/pages/site/faq.html:281 @@ -3819,9 +3200,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" msgstr "" #: i2p2www/pages/site/faq.html:285 @@ -3874,153 +3253,102 @@ msgstr "" #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on configclients. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on configclients. \n" " May be changed in the bob.config file." msgstr "" #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.HTTPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.HTTPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.SSDPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.SSDPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on configclients but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on configclients." +" May be changed to a different port on configclients but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on configclients." msgstr "" #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on configclients. \n" -" May be changed in the clients.config file with the" -" SAM command line option sam.udp.port=nnnn." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on configclients. \n" +" May be changed in the clients.config file with the SAM command line option sam.udp.port=nnnn." msgstr "" #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on configclients. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on configclients. \n" " May be changed in the clients.config file." msgstr "" #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the clients.configfile. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." +" May also be configured to be bound to a specific interface or all interfaces in that file." msgstr "" #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the clients.config file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the jetty.xml file." +" May also be configured to be bound to a specific interface or all interfaces in the jetty.xml file." msgstr "" #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." -msgstr "" -"Puede desactivarse o modificarse en la página i2ptunnel de la consola del" -" router. \n" -" También puede configurarse para que esté vinculado a una " -"interfaz específica o a todas las interfaces." +" May also be configured to be bound to a specific interface or all interfaces." +msgstr "Puede desactivarse o modificarse en la página i2ptunnel de la consola del router. \n También puede configurarse para que esté vinculado a una interfaz específica o a todas las interfaces." #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the wrapper documentation. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the wrapper documentation. \n" +"To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." -msgstr "" -"Los puertos locales de I2P y los puertos de I2PTunnel no necesitan ser " -"accesibles desde máquinas remotas, pero *deberían* ser accesibles " -"localmente. Además puede crear también puertos adicionales para " -"instancias I2PTunnel vía http://localhost:7657/i2ptunnel/ (y a su vez, " -"necesitará permitir en su cortafuegos el acceso local, pero no remoto, a " -"no ser que lo desee así)." +msgstr "Los puertos locales de I2P y los puertos de I2PTunnel no necesitan ser accesibles desde máquinas remotas, pero *deberían* ser accesibles localmente. Además puede crear también puertos adicionales para instancias I2PTunnel vía http://localhost:7657/i2ptunnel/ (y a su vez, necesitará permitir en su cortafuegos el acceso local, pero no remoto, a no ser que lo desee así)." #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"outbound facing port, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the outbound facing port, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." -msgstr "" -"Resumiendo, nada necesita ser accesible por pares remotos que no hayan " -"sido solicitados, pero, si puede configurar su NAT/cortafuegos para " -"permitir conexiones de entrada UDP y TCP hacia los puertos de escucha de salida, " -"tendrá mejor rendimiento. También necesitará ser capaz de enviar paquetes" -" UDP de salida a pares remotos arbitrarios ( bloqueando IPs " -"aleatoriamente con cosas como PeerGuardian solo le perjudica a usted - no" -" lo haga)." +msgstr "Resumiendo, nada necesita ser accesible por pares remotos que no hayan sido solicitados, pero, si puede configurar su NAT/cortafuegos para permitir conexiones de entrada UDP y TCP hacia los puertos de escucha de salida, tendrá mejor rendimiento. También necesitará ser capaz de enviar paquetes UDP de salida a pares remotos arbitrarios ( bloqueando IPs aleatoriamente con cosas como PeerGuardian solo le perjudica a usted - no lo haga)." #: i2p2www/pages/site/faq.html:534 msgid "This question can be answered in 3 parts:" @@ -4030,28 +3358,20 @@ msgstr "Esta pregunta puede responderse en 3 partes:" msgid "" "My router often displays a message saying \"Website Not Found In Address " "Book\", why do I see this message?" -msgstr "" -"Mi router muestra a menudo un mensaje que dice \"Website Not Found In " -"Address Book\", ¿por qué veo este mensaje?" +msgstr "Mi router muestra a menudo un mensaje que dice \"Website Not Found In Address Book\", ¿por qué veo este mensaje?" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as http://website.i2p are references" -" to a long, random string known as a destination. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a SHA256 hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." +"Human-readable addresses such as http://website.i2p are references to a long, random string known as a destination. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a SHA256 hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." msgstr "" #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." msgstr "" #: i2p2www/pages/site/faq.html:545 @@ -4060,8 +3380,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." msgstr "" #: i2p2www/pages/site/faq.html:547 @@ -4081,8 +3401,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" msgstr "" @@ -4103,17 +3422,14 @@ msgstr "" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" msgstr "" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" msgstr "" #: i2p2www/pages/site/faq.html:593 @@ -4122,118 +3438,84 @@ msgstr "" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to http://localhost:7657/configui" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." +"Go to http://localhost:7657/configui and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." msgstr "" #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to http://localhost:7657/index and " -"hit \"Graceful restart\", \n" +"Go to http://localhost:7657/index and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" msgstr "" #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at http://(System_IP):7657 and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at http://(System_IP):7657 and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." msgstr "" #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." msgstr "" #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"http://localhost:7657/configi2cp" +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"http://localhost:7657/configi2cp" msgstr "" #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." msgstr "" #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." msgstr "" #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the socks page." -msgstr "" -"Si aún así desea mas información sobre el proxy socks, hay algunas " -"sugerencias útiles en la web de socks" +msgstr "Si aún así desea mas información sobre el proxy socks, hay algunas sugerencias útiles en la web de socks" #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" +"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" "as there are serious anonymity-related issues associated with doing so." msgstr "" #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." -msgstr "" -"¿Es mi router un \"nodo de salida\" a la Internet regular? No quiero que " -"lo sea." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." +msgstr "¿Es mi router un \"nodo de salida\" a la Internet regular? No quiero que lo sea." #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike Tor, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike Tor, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an outproxy guide available on our " -"forums, if you would like to learn more about running an outproxy." +"There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy." msgstr "" #: i2p2www/pages/site/faq.html:679 @@ -4243,185 +3525,128 @@ msgstr "" #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" msgstr "" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." msgstr "" #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." msgstr "" #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through Transport" -" Layer Security (TLS). \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." msgstr "" #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" +"For more information, you may read the Tor FAQ's answer to this question:\n" +"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" msgstr "" #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on %(zzz)s.\n" -"This discussion has been mirrored on our " -"forums as well." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on %(zzz)s.\n" +"This discussion has been mirrored on our forums as well." msgstr "" #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your threat model, and how much you " -"choose to trust the outproxy operator." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your threat model, and how much you choose to trust the outproxy operator." msgstr "" #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." msgstr "" #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." msgstr "" #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." msgstr "" #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the reseed instructions." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the reseed instructions." msgstr "" #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." msgstr "" #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." -msgstr "" -"Un síntoma típico de un resembrado fallido es el indicador \"Conocidos\" " -"(a la\n" -"izquierda de la barra lateral de la consola del router I2P) mostrando un " -"valor\n" -"muy pequeño (a menudo menor que 5) que no se incrementa. Esto puede\n" -"ocurrir, entre otras cosas, si su cortafuegos (firewall) local limita el " -"tráfico\n" -"saliente o si la petición de resembrado está bloqueada por completo." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." +msgstr "Un síntoma típico de un resembrado fallido es el indicador \"Conocidos\" (a la\nizquierda de la barra lateral de la consola del router I2P) mostrando un valor\nmuy pequeño (a menudo menor que 5) que no se incrementa. Esto puede\nocurrir, entre otras cosas, si su cortafuegos (firewall) local limita el tráfico\nsaliente o si la petición de resembrado está bloqueada por completo." #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." -msgstr "" -"Si está atrapado detrás de un cortafuegos o filtro de su proveedor de\n" -"Internet (ISP), puede usar el siguiente método manual (solución técnica\n" -"no-automatizada) para unirse a la red I2P." +msgstr "Si está atrapado detrás de un cortafuegos o filtro de su proveedor de\nInternet (ISP), puede usar el siguiente método manual (solución técnica\nno-automatizada) para unirse a la red I2P." #: i2p2www/pages/site/faq.html:784 #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to %(url)s and configure the proxy type, " -"hostname, and port." -msgstr "" -"\n" -"Desde la versión 0.9.33, también puede configurar su router I2P para " -"resembrar a través de proxy.\n" -"Vaya a %(url)s y configure el tipo de proxy, " -"nombre de servidor, y puerto." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to %(url)s and configure the proxy type, hostname, and port." +msgstr "\nDesde la versión 0.9.33, también puede configurar su router I2P para resembrar a través de proxy.\nVaya a %(url)s y configure el tipo de proxy, nombre de servidor, y puerto." #: i2p2www/pages/site/faq.html:789 msgid "Joining the I2P Network using a reseed file" @@ -4429,34 +3654,14 @@ msgstr "Unirse a la red I2P usando un fichero de resembrado" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." -msgstr "" -"Por favor, contacte con un amigo de conocida confianza que tenga un " -"router I2P\n" -"en ejecución, y pídale ayuda con el resembrado de su router I2P. Pídale " -"que le\n" -"envíe un fichero de resembrado exportado desde su router I2P en " -"ejecución. Es\n" -"vital que el fichero sea intercambiado a través de un canal seguro, ej. " -"cifrado para\n" -"evitar alteraciones externas (firma PGP, cifrado y verificado con una " -"clave pública\n" -"de confianza). El propio fichero no está firmado, así que, por favor, " -"sólo acepte\n" -"ficheros de amigos de conocida confianza. Nunca importe un fichero de\n" -"resembrado si no puede verificar su procedencia." +msgstr "Por favor, contacte con un amigo de conocida confianza que tenga un router I2P\nen ejecución, y pídale ayuda con el resembrado de su router I2P. Pídale que le\nenvíe un fichero de resembrado exportado desde su router I2P en ejecución. Es\nvital que el fichero sea intercambiado a través de un canal seguro, ej. cifrado para\nevitar alteraciones externas (firma PGP, cifrado y verificado con una clave pública\nde confianza). El propio fichero no está firmado, así que, por favor, sólo acepte\nficheros de amigos de conocida confianza. Nunca importe un fichero de\nresembrado si no puede verificar su procedencia." #: i2p2www/pages/site/faq.html:800 #, python-format @@ -4484,9 +3689,7 @@ msgstr "Pulse \"Resembrar desde fichero\"" #: i2p2www/pages/site/faq.html:807 #, python-format msgid "Check the log for the following message:" -msgstr "" -"Compruebe el registro (log) para el siguiente " -"mensaje:" +msgstr "Compruebe el registro (log) para el siguiente mensaje:" #: i2p2www/pages/site/faq.html:811 msgid "Sharing a reseed file" @@ -4494,11 +3697,9 @@ msgstr "Compartir un fichero de resembrado" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" -msgstr "" -"Para amigos de confianza puede usar su router I2P local para brindarles " -"un arranque asistido:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" +msgstr "Para amigos de confianza puede usar su router I2P local para brindarles un arranque asistido:" #: i2p2www/pages/site/faq.html:815 msgid "Under \"Create Reseed File\" click \"Create reseed file\"" @@ -4512,21 +3713,11 @@ msgstr "Enviar de forma segura el fichero %(filename)s a un amigo" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." -msgstr "" -"¡No revele este fichero a usuarios desconocidos en ningún caso, ya que " -"contiene\n" -"datos privados sensibles (100 RouterInfo) de su propio router I2P! Para " -"proteger\n" -"su anonimato: puede esperar unas pocas horas/días antes de compartir el\n" -"fichero con su amigo de confianza. También es aconsejable usar este\n" -"procedimiento con moderación (< 2 veces por semana)." +msgstr "¡No revele este fichero a usuarios desconocidos en ningún caso, ya que contiene\ndatos privados sensibles (100 RouterInfo) de su propio router I2P! Para proteger\nsu anonimato: puede esperar unas pocas horas/días antes de compartir el\nfichero con su amigo de confianza. También es aconsejable usar este\nprocedimiento con moderación (< 2 veces por semana)." #: i2p2www/pages/site/faq.html:826 msgid " General guidelines for manual reseeding of I2P " @@ -4534,17 +3725,14 @@ msgstr " Directrices generales para el resembrado manual de I2P " #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" -msgstr "" -"¡No publique abiertamente el fichero de resembrado (clearnet) ni comparta" -" estos ficheros con un amigo de un amigo (darknet)!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" +msgstr "¡No publique abiertamente el fichero de resembrado (clearnet) ni comparta estos ficheros con un amigo de un amigo (darknet)!" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" -msgstr "" -"¡Este fichero sólo se debe usar para un número muy limitado de amigos " -"(<3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" +msgstr "¡Este fichero sólo se debe usar para un número muy limitado de amigos (<3)!" #: i2p2www/pages/site/faq.html:830 msgid "The file is valid only a few days (< 20)!" @@ -4552,90 +3740,42 @@ msgstr "¡El fichero sólo es válido unos pocos días (< 20)!" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using Tor." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using Tor." msgstr "" #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." -msgstr "" -"Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" -"\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." +msgstr "Within I2P, there is no requirement to use HTTPS. \n All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n\n However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n Any hidden service operator would have to specifically set up and enable HTTPS access." #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." -msgstr "" -"El FTP no es compatible por razones técnicas.\n" -"\n" -" No existen \"outproxies\" FTP a Internet, ni siquiera es posible " -"instalarlos. \n" -" Cualquier otro tipo de outproxy puede funcionar si se configura con " -"un túnel estándar. \n" -" Si desea configurar algún tipo de outproxy, investigue cuidadosamente" -" los riesgos potenciales. \n" -" La comunidad I2P puede o no ayudarle con los aspectos técnicos, no " -"dude en preguntar.\n" -"\n" -" Como ya se ha explicado en varias ocasiones, cualquier outproxy " -"existente no es una parte central de la red. \n" -" Son servicios gestionados por particulares y pueden estar operativos " -"o no en un momento dado." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." +msgstr "El FTP no es compatible por razones técnicas.\n\n No existen \"outproxies\" FTP a Internet, ni siquiera es posible instalarlos. \n Cualquier otro tipo de outproxy puede funcionar si se configura con un túnel estándar. \n Si desea configurar algún tipo de outproxy, investigue cuidadosamente los riesgos potenciales. \n La comunidad I2P puede o no ayudarle con los aspectos técnicos, no dude en preguntar.\n\n Como ya se ha explicado en varias ocasiones, cualquier outproxy existente no es una parte central de la red. \n Son servicios gestionados por particulares y pueden estar operativos o no en un momento dado." #: i2p2www/pages/site/faq.html:876 msgid "My router is using a large amount of CPU, what can I do about this?" -msgstr "" -"Mi router está utilizando una gran cantidad de CPU, ¿qué puedo hacer al " -"respecto?" +msgstr "Mi router está utilizando una gran cantidad de CPU, ¿qué puedo hacer al respecto?" #: i2p2www/pages/site/faq.html:877 msgid "There are many possible causes of high CPU usage. Here is a checklist:" -msgstr "" -"Hay muchas causas posibles para un elevado uso de la CPU. Aquí tiene una " -"lista para su comprobación:" +msgstr "Hay muchas causas posibles para un elevado uso de la CPU. Aquí tiene una lista para su comprobación:" #: i2p2www/pages/site/faq.html:882 msgid "Java Runtime Environment" @@ -4643,10 +3783,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"java -version at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing java -version at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." msgstr "" @@ -4656,14 +3794,9 @@ msgstr "Aplicaciones de intercambio de archivos, como BitTorrent" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." -msgstr "" -"¿Está ejecutando un cliente Bittorrent sobre I2P? Intente reducir el " -"número de torrents, \n" -"los límites de ancho de banda, o pruebe a apagarlo completamente a ver si" -" eso ayuda." +msgstr "¿Está ejecutando un cliente Bittorrent sobre I2P? Intente reducir el número de torrents, \nlos límites de ancho de banda, o pruebe a apagarlo completamente a ver si eso ayuda." #: i2p2www/pages/site/faq.html:895 msgid "High bandwidth settings" @@ -4671,17 +3804,9 @@ msgstr "Ajustes de gran ancho de banda" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for share bandwidth percentage on the " -"configuration page." -msgstr "" -"¿Están sus límites de ancho de banda configurados demasiado altos? Es " -"posible \n" -"que pase demasiado tráfico a través de su router I2P y esté saturado. " -"Intente reducir \n" -"el porcentaje de ancho de banda compartido en la página de configuración." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for share bandwidth percentage on the configuration page." +msgstr "¿Están sus límites de ancho de banda configurados demasiado altos? Es posible \nque pase demasiado tráfico a través de su router I2P y esté saturado. Intente reducir \nel porcentaje de ancho de banda compartido en la página de configuración." #: i2p2www/pages/site/faq.html:901 msgid "I2P Version" @@ -4689,11 +3814,9 @@ msgstr "Versión de I2P" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." -msgstr "" -"Asegúrese de usar la última versión de I2P para beneficiarse de las " -"mejoras de rendimiento y la solución de errores." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." +msgstr "Asegúrese de usar la última versión de I2P para beneficiarse de las mejoras de rendimiento y la solución de errores." #: i2p2www/pages/site/faq.html:907 msgid "Memory allocation" @@ -4701,12 +3824,9 @@ msgstr "Asignación de memoria" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on the graphs page \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting wrapper.java.maxmemory in the file " -"wrapper.config." +"Has enough memory been set aside for use by I2P? Look at the memory graph on the graphs page \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting wrapper.java.maxmemory in the file wrapper.config." msgstr "" #: i2p2www/pages/site/faq.html:915 @@ -4716,13 +3836,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." -msgstr "" -"¿El uso de la CPU es simplemente mayor de lo que te gustaría, o está " -"fijado en 100% durante mucho tiempo?\n" -"Si es así, podría tratarse de un error. Busca pistas en los registros." +msgstr "¿El uso de la CPU es simplemente mayor de lo que te gustaría, o está fijado en 100% durante mucho tiempo?\nSi es así, podría tratarse de un error. Busca pistas en los registros." #: i2p2www/pages/site/faq.html:922 msgid "Java-related" @@ -4731,18 +3847,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the jbigi page for instructions on " -"diagnosing, building, and testing methods." -msgstr "" -"Puede que esté usando la librería BigInteger en vez de la versión nativa," -" \n" -"especialmente si lo ejecuta en un sistema o hardware nuevo o inusual \n" -"(OpenSolaris, mipsel, etc). Visite la web de " -"jbigi que \n" -"incluye instrucciones para el diagnóstico, compilado y métodos de testeo." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the jbigi page for instructions on diagnosing, building, and testing methods." +msgstr "Puede que esté usando la librería BigInteger en vez de la versión nativa, \nespecialmente si lo ejecuta en un sistema o hardware nuevo o inusual \n(OpenSolaris, mipsel, etc). Visite la web de jbigi que \nincluye instrucciones para el diagnóstico, compilado y métodos de testeo." #: i2p2www/pages/site/faq.html:929 msgid "Participating tunnels" @@ -4750,217 +3857,109 @@ msgstr "Túneles participantes" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the confignet page,\n" -"or by setting router.maxParticipatingTunnels=nnn on the configadvanced " -"page." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the confignet page,\n" +"or by setting router.maxParticipatingTunnels=nnn on the configadvanced page." msgstr "" #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" http://localhost:7657/config" +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" http://localhost:7657/config" msgstr "" #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." -msgstr "" -"No, no pasa nada. \n" -"Es un comportamiento normal. \n" -"Todos los routers se ajustan dinámicamente a las condiciones y demandas " -"cambiantes de la red. \n" -"Los routers se conectan y desconectan dependiendo de si el sistema en el " -"que están instalados está operativo o no, así como de si hay una conexión" -" de red disponible. \n" -"El router actualiza constantemente su base de datos de red local. \n" -"Los túneles en los que participa su router expiran cada 10 minutos y " -"pueden o no ser reconstruidos a través de su router." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." +msgstr "No, no pasa nada. \nEs un comportamiento normal. \nTodos los routers se ajustan dinámicamente a las condiciones y demandas cambiantes de la red. \nLos routers se conectan y desconectan dependiendo de si el sistema en el que están instalados está operativo o no, así como de si hay una conexión de red disponible. \nEl router actualiza constantemente su base de datos de red local. \nLos túneles en los que participa su router expiran cada 10 minutos y pueden o no ser reconstruidos a través de su router." #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" -msgstr "" -"El cifrado y el encaminamiento dentro de la red I2P añaden una cantidad " -"considerable de sobrecarga y limitan el ancho de banda. \n" -"\n" -"Podemos intentar aclararlo con ayuda de un diagrama:" +msgstr "El cifrado y el encaminamiento dentro de la red I2P añaden una cantidad considerable de sobrecarga y limitan el ancho de banda. \n\nPodemos intentar aclararlo con ayuda de un diagrama:" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." -msgstr "" -"En este diagrama se muestra la ruta que sigue el tráfico I2P en su viaje " -"por la red. \n" -"El enrutador I2P de un usuario está representado por la casilla \"A\" y " -"un servicio oculto I2P (por ejemplo, el sitio web http://stats.i2p) por " -"la casilla \"B\". \n" -"Tanto el cliente como el servidor utilizan túneles de 3 saltos, " -"representados por las casillas \"P\", \"Q\", \"R\", \"X\", \"Y\", \"Z\", " -"\"P_1\", \"Q_1\", \"R'_1, \"X_1\", \"Y_1\" y \"Z_1\"." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +msgstr "En este diagrama se muestra la ruta que sigue el tráfico I2P en su viaje por la red. \nEl enrutador I2P de un usuario está representado por la casilla \"A\" y un servicio oculto I2P (por ejemplo, el sitio web http://stats.i2p) por la casilla \"B\". \nTanto el cliente como el servidor utilizan túneles de 3 saltos, representados por las casillas \"P\", \"Q\", \"R\", \"X\", \"Y\", \"Z\", \"P_1\", \"Q_1\", \"R'_1, \"X_1\", \"Y_1\" y \"Z_1\"." #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." -msgstr "" -"Las casillas \"P\", \"Q\" y \"R\" representan un túnel de salida para A, " -"mientras que las casillas \"X_1\", \"Y_1\" y \"Z_1\" representan un túnel" -" de salida para \"B\". \n" -"Del mismo modo, las casillas \"X\", \"Y\" y \"Z\" representan un túnel de" -" entrada para \"B\", mientras que las casillas \"P_1\", \"Q_1\" y \"R_1\"" -" representan un túnel de entrada para \"A\". \n" -"Las flechas entre las casillas indican el sentido del tráfico. \n" -"El texto encima y debajo de las flechas muestra ejemplos de ancho de " -"banda entre un par de saltos y ejemplos de latencia." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." +msgstr "Las casillas \"P\", \"Q\" y \"R\" representan un túnel de salida para A, mientras que las casillas \"X_1\", \"Y_1\" y \"Z_1\" representan un túnel de salida para \"B\". \nDel mismo modo, las casillas \"X\", \"Y\" y \"Z\" representan un túnel de entrada para \"B\", mientras que las casillas \"P_1\", \"Q_1\" y \"R_1\" representan un túnel de entrada para \"A\". \nLas flechas entre las casillas indican el sentido del tráfico. \nEl texto encima y debajo de las flechas muestra ejemplos de ancho de banda entre un par de saltos y ejemplos de latencia." #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." -msgstr "" -"Cuando tanto el cliente como el servidor utilizan túneles de 3 saltos, un" -" total de otros 12 enrutadores I2P participan en la retransmisión del " -"tráfico. \n" -"6 peers retransmiten el tráfico del cliente al servidor, que se divide en" -" un túnel de salida de 3 saltos desde \"A\" (\"P\", \"Q\", \"R\") y un " -"túnel de entrada de 3 saltos hacia \"B\" (\"X\", \"Y\", \"Z\"). \n" -"Del mismo modo, 6 pares retransmiten el tráfico desde el servidor hasta " -"el cliente." +msgstr "Cuando tanto el cliente como el servidor utilizan túneles de 3 saltos, un total de otros 12 enrutadores I2P participan en la retransmisión del tráfico. \n6 peers retransmiten el tráfico del cliente al servidor, que se divide en un túnel de salida de 3 saltos desde \"A\" (\"P\", \"Q\", \"R\") y un túnel de entrada de 3 saltos hacia \"B\" (\"X\", \"Y\", \"Z\"). \nDel mismo modo, 6 pares retransmiten el tráfico desde el servidor hasta el cliente." #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" -msgstr "" -"En primer lugar, podemos considerar la latencia: el tiempo que tarda una " -"solicitud de un cliente en atravesar la red I2P, llegar al servidor y " -"volver al cliente. \n" -"Sumando todas las latencias vemos que:" +msgstr "En primer lugar, podemos considerar la latencia: el tiempo que tarda una solicitud de un cliente en atravesar la red I2P, llegar al servidor y volver al cliente. \nSumando todas las latencias vemos que:" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." -msgstr "" -"En nuestro ejemplo, el tiempo total de ida y vuelta asciende a 740 ms, " -"mucho más de lo que se tarda normalmente en navegar por sitios web " -"normales." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." +msgstr "En nuestro ejemplo, el tiempo total de ida y vuelta asciende a 740 ms, mucho más de lo que se tarda normalmente en navegar por sitios web normales." #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." msgstr "" #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the http://localhost:7657/config " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the http://localhost:7657/config page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." msgstr "" #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." -msgstr "" -"También recomendamos establecer una cantidad suficiente de ancho de banda" -" compartido - esto permite que los túneles participantes sean enrutados a" -" través de su router I2P. \n" -"Permitir el tráfico participante mantiene su router bien integrado en la " -"red y mejora sus velocidades de transferencia." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." +msgstr "También recomendamos establecer una cantidad suficiente de ancho de banda compartido - esto permite que los túneles participantes sean enrutados a través de su router I2P. \nPermitir el tráfico participante mantiene su router bien integrado en la red y mejora sus velocidades de transferencia." #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, install the latest " -"release." -msgstr "" -"I2P es un trabajo en curso. Muchas mejoras y arreglos están siendo " -"implementadas, y generalmente usando la última versión mejorará el " -"rendimiento. Si no la tiene, instale la " -"última versión." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, install the latest release." +msgstr "I2P es un trabajo en curso. Muchas mejoras y arreglos están siendo implementadas, y generalmente usando la última versión mejorará el rendimiento. Si no la tiene, instale la última versión." #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." -msgstr "" -"Puedes informar de cualquier error/problema que encuentres en nuestro " -"bugtracker, que está disponible tanto en Internet no privado como en I2P." -" \n" -"Tenemos un foro de debate, también disponible en I2P y en Internet no " -"privado. También puedes unirte a nuestro canal de IRC: \n" -"ya sea a través de nuestra red IRC, IRC2P, o en Freenode." +msgstr "Puedes informar de cualquier error/problema que encuentres en nuestro bugtracker, que está disponible tanto en Internet no privado como en I2P. \nTenemos un foro de debate, también disponible en I2P y en Internet no privado. También puedes unirte a nuestro canal de IRC: \nya sea a través de nuestra red IRC, IRC2P, o en Freenode." #: i2p2www/pages/site/faq.html:1044 msgid "Our Bugtracker:" @@ -4980,14 +3979,10 @@ msgstr "Nuestros foros:" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" PrivateBin Wiki, or an I2P paste service such as this \n" -" PrivateBin instance or this" -" \n" -" Javascript-free paste service and" -" follow up on IRC in #i2p<" +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" PrivateBin Wiki, or an I2P paste service such as this \n" +" PrivateBin instance or this \n" +" Javascript-free paste service and follow up on IRC in #i2p<" msgstr "" #: i2p2www/pages/site/faq.html:1054 @@ -4996,13 +3991,10 @@ msgstr "Únete a #i2p-dev Discute con los desarrolladores en IRC" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "http://127.0.0.1:7657/logs.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." msgstr "" #: i2p2www/pages/site/faq.html:1070 @@ -5013,8 +4005,7 @@ msgid "" "
  • on irc.freenode.net channel #i2p
  • \n" "
  • on IRC2P channel #i2p
  • \n" "\n" -"or post to the forum and we'll post it " -"here (with the answer, hopefully)." +"or post to the forum and we'll post it here (with the answer, hopefully)." msgstr "" #: i2p2www/pages/site/impressum.html:4 @@ -5028,12 +4019,9 @@ msgstr "Red anónima I2P" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." -msgstr "" -"Capa anónima de comunicación distribuida par-a-par construida con " -"herramientas de código libre y diseñada para usar cualquier servicio de " -"internet tradicional como email, IRC, foros o páginas webs." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." +msgstr "Capa anónima de comunicación distribuida par-a-par construida con herramientas de código libre y diseñada para usar cualquier servicio de internet tradicional como email, IRC, foros o páginas webs." #: i2p2www/pages/site/index.html:8 msgid "Welcome to the Invisible Internet" @@ -5041,14 +4029,9 @@ msgstr "Bienvenido a Internet invisible" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" -" " -msgstr "" -"Internet Invisible es una red de privacidad por diseño, impulsada por las" -" personas. Es una alternativa a Internet verdaderamente libre y anónima. " -"Consigue I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " +msgstr "Internet Invisible es una red de privacidad por diseño, impulsada por las personas. Es una alternativa a Internet verdaderamente libre y anónima. Consigue I2P.\n " #: i2p2www/pages/site/index.html:11 #, python-format @@ -5062,24 +4045,11 @@ msgstr "¿Qué es I2P?" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." -msgstr "" -"\n" -" El Proyecto Internet Invisible (I2P) es una capa de red privada " -"totalmente encriptada.\n" -" Protege su actividad y localización. Cada día la gente utiliza la" -" red para conectarse\n" -" con otras personas sin preocuparse de que las rastreen o " -"recopilen sus datos. En algunos\n" -" En algunos casos, la gente confía en la red cuando necesita ser " -"discreta o está realizando un trabajo delicado." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." +msgstr "\n El Proyecto Internet Invisible (I2P) es una capa de red privada totalmente encriptada.\n Protege su actividad y localización. Cada día la gente utiliza la red para conectarse\n con otras personas sin preocuparse de que las rastreen o recopilen sus datos. En algunos\n En algunos casos, la gente confía en la red cuando necesita ser discreta o está realizando un trabajo delicado." #: i2p2www/pages/site/index.html:23 msgid "I2P Cares About Privacy" @@ -5088,22 +4058,14 @@ msgstr "" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." -msgstr "" -"I2P oculta el servidor al usuario y el usuario al servidor. Todo el " -"tráfico I2P es interno a la red I2P. El tráfico dentro de I2P no " -"interactúa directamente con Internet. Es una capa superior a Internet. " -"Utiliza túneles unidireccionales encriptados entre usted y sus pares. " -"Nadie puede ver de dónde viene el tráfico, a dónde va o cuál es su " -"contenido. Además, I2P ofrece resistencia al reconocimiento de patrones y" -" al bloqueo por parte de los censores. Como la red se basa en los pares " -"para enrutar el tráfico, también se reduce el bloqueo por localización." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." +msgstr "I2P oculta el servidor al usuario y el usuario al servidor. Todo el tráfico I2P es interno a la red I2P. El tráfico dentro de I2P no interactúa directamente con Internet. Es una capa superior a Internet. Utiliza túneles unidireccionales encriptados entre usted y sus pares. Nadie puede ver de dónde viene el tráfico, a dónde va o cuál es su contenido. Además, I2P ofrece resistencia al reconocimiento de patrones y al bloqueo por parte de los censores. Como la red se basa en los pares para enrutar el tráfico, también se reduce el bloqueo por localización." #: i2p2www/pages/site/index.html:27 msgid "Read more…" @@ -5116,13 +4078,9 @@ msgstr "" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." -msgstr "" -"La red está impulsada por las personas. Los pares ponen una parte de sus " -"recursos, en particular el ancho de banda, a disposición de los demás " -"participantes en la red. Esto permite que la red funcione sin depender de" -" servidores centralizados." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." +msgstr "La red está impulsada por las personas. Los pares ponen una parte de sus recursos, en particular el ancho de banda, a disposición de los demás participantes en la red. Esto permite que la red funcione sin depender de servidores centralizados." #: i2p2www/pages/site/index.html:33 msgid "Learn more about the Protocol Stack" @@ -5136,9 +4094,7 @@ msgstr "Privacidad y seguridad por diseño" msgid "" "I2P has created transport protocols that resist DPI censorship, and " "continuously improves its end to end encryption." -msgstr "" -"I2P ha creado protocolos de transporte resistentes a la censura DPI y " -"mejora continuamente su cifrado de extremo a extremo." +msgstr "I2P ha creado protocolos de transporte resistentes a la censura DPI y mejora continuamente su cifrado de extremo a extremo." #: i2p2www/pages/site/index.html:37 msgid "Read the I2P Transport Overview" @@ -5172,11 +4128,8 @@ msgstr "Enlaces recomendados y más recursos" #, python-format msgid "" "See also the page with\n" -"links to presentations, videos, and tutorials about" -" I2P." -msgstr "" -"Vea también la web con a href=\"%(media)s\">enlaces a presentaciones, " -"vídeos, y manuales sobre I2P." +"links to presentations, videos, and tutorials about I2P." +msgstr "Vea también la web con a href=\"%(media)s\">enlaces a presentaciones, vídeos, y manuales sobre I2P." #: i2p2www/pages/site/links.html:12 msgid "I2P on the web" @@ -5201,4 +4154,3 @@ msgstr "Foros, sitio de noticias y otros" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" msgstr "Cosas muy antiguas" - diff --git a/i2p2www/translations/es/LC_MESSAGES/research.po b/i2p2www/translations/es/LC_MESSAGES/research.po index 723a18fd..efd9c688 100644 --- a/i2p2www/translations/es/LC_MESSAGES/research.po +++ b/i2p2www/translations/es/LC_MESSAGES/research.po @@ -1,31 +1,32 @@ -# Spanish translations for I2P. -# Copyright (C) 2021 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Adolfo Jayme-Barrientos, 2013 -# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 -# <454cc45058db9632179dc8079c0c1af3_5311>, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # m1xxy , 2011 +# Manuel , 2023 # Oliver Trash , 2013 # strel, 2013-2017 # strel, 2013 # trolly, 2013 # fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"POT-Creation-Date: 2022-08-21 15:33+0000\n" "PO-Revision-Date: 2013-07-15 12:01+0000\n" -"Last-Translator: strel, 2013-2017\n" -"Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n" -"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 " -"? 1 : 2\n" +"Last-Translator: Manuel , 2023\n" +"Language-Team: Spanish (http://app.transifex.com/otf/I2P/language/es/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es\n" +"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -34,7 +35,7 @@ msgstr "Investigación académica" #: i2p2www/pages/site/research/index.html:3 #: i2p2www/pages/site/research/questions.html:3 msgid "May 2018" -msgstr "" +msgstr "Mayo de 2018" #: i2p2www/pages/site/research/index.html:6 msgid "Introduction" @@ -42,140 +43,103 @@ msgstr "Introducción\n" #: i2p2www/pages/site/research/index.html:8 msgid "Research on the I2P Network" -msgstr "" +msgstr "Investigación sobre la red I2P" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." -msgstr "" +msgstr "I2P es un proyecto único que, por desgracia, no ha recibido la atención académica que merece.\nHasta la fecha, la mayor parte de la investigación tecnología de enrutamiento cebolla\nha sido en torno a Tor, y mientras que los estudios nos benefician también, \nhay una gran necesidad de investigación centrada en I2P. Esto juega un papel clave\ntanto en el mantenimiento de la seguridad y la integridad de la red, así como \npara abrir puertas a futuros desarrollos más impactantes." #: i2p2www/pages/site/research/index.html:19 #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "Free Haven Anonymity Bibliography.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" -msgstr "" -"\n" -"Hay una gran comunidad investigando un amplio rango de aspectos sobre el " -"anonimato. Para una lista actualizada y completa de trabajos, vea la bibliografía de anonimato del proyecto Free " -"Haven. I2P se beneficia mucho de la investigación acerca deTor y el " -"enrutamiento onion, pero hay poco interés dedicado al estudio de la " -"teoría tras I2P, y sobre las elecciones y equilibrios que produce la red." -" Esto presenta una oportunidad única para la investigación original.\n" +msgstr "\nHay una gran comunidad investigando un amplio rango de aspectos sobre el anonimato. Para una lista actualizada y completa de trabajos, vea la bibliografía de anonimato del proyecto Free Haven. I2P se beneficia mucho de la investigación acerca deTor y el enrutamiento onion, pero hay poco interés dedicado al estudio de la teoría tras I2P, y sobre las elecciones y equilibrios que produce la red. Esto presenta una oportunidad única para la investigación original.\n" #: i2p2www/pages/site/research/index.html:29 #, python-format msgid "" "A list of known published papers about I2P is available here." -msgstr "" -"Una lista de ensayos publicados sobre I2P está disponible aquí." +msgstr "Una lista de ensayos publicados sobre I2P está disponible aquí." #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" -msgstr "" +msgstr "\nEsta página tiene como objetivo esbozar los campos de investigación más necesarios, \nnotas para investigadores potenciales, nuestras directrices generales de seguridad y una lista \nde preguntas abiertas por las que puede empezar en cualquier momento.\n" #: i2p2www/pages/site/research/index.html:40 msgid "Notes to Researchers:" -msgstr "" +msgstr "Notas para los investigadores:" #: i2p2www/pages/site/research/index.html:42 msgid "Defensive Research" -msgstr "" +msgstr "Investigación defensiva" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" #: i2p2www/pages/site/research/index.html:54 msgid "Offensive and Analytic Tests" -msgstr "" +msgstr "Pruebas ofensivas y analíticas" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"please \n" -"communicate your ideas to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to please \n" +"communicate your ideas to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" #: i2p2www/pages/site/research/index.html:71 msgid "Research Ethics & Testing the Network" -msgstr "" +msgstr "Ética de la investigación & Probando la red" #: i2p2www/pages/site/research/index.html:73 msgid "General Guidelines" -msgstr "" +msgstr "Directrices generales" #: i2p2www/pages/site/research/index.html:75 msgid "" "
      \n" "
    1. \n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" "
    2. \n" "
    3. \n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" "
    4. \n" "
    5. \n" @@ -183,10 +147,8 @@ msgid "" " collecting data about yourself\n" "
    6. \n" "
    7. \n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" "
    8. \n" "
    9. \n" @@ -194,10 +156,8 @@ msgid "" " publication and collect as little as possible\n" "
    10. \n" "
    11. \n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is not intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is not intended to be private by the\n" " originator\n" "
    12. \n" "
    " @@ -205,53 +165,42 @@ msgstr "" #: i2p2www/pages/site/research/index.html:106 msgid "Using a Test Network to Attack I2P" -msgstr "" +msgstr "Usando una red de prueba para atacar I2P" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add i2p.vmCommSystem=true to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add i2p.vmCommSystem=true to the\n" "router.config before starting." msgstr "" #: i2p2www/pages/site/research/index.html:131 msgid "Testing on the Live I2P Network" -msgstr "" +msgstr "Pruebas en la red I2P en vivo" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please contact\n" +"As stated above in the researcher notes, please contact\n" " us before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -261,35 +210,23 @@ msgstr "Configuración de familia de routers I2P" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -303,7 +240,7 @@ msgstr "Base de datos de red" #: i2p2www/pages/site/research/questions.html:6 msgid "Floodfills" -msgstr "" +msgstr "Vertederos" #: i2p2www/pages/site/research/questions.html:19 msgid "Transports" @@ -335,7 +272,7 @@ msgstr "Anonimato" #: i2p2www/pages/site/research/questions.html:75 msgid "Network Related" -msgstr "" +msgstr "Relacionados con la red" #: i2p2www/pages/site/research/vrp.html:2 msgid "Vulnerability Response Process" @@ -344,35 +281,24 @@ msgstr "Proceso de respuesta a la vulnerabilidad (VRP)" #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." -msgstr "" -"\n" -"Este proceso está sujeto a cambio. Por favor, refiérase a esta página " -"para el actual VRP." +"This process is subject to change. Please refer to this page for the current VRP." +msgstr "\nEste proceso está sujeto a cambio. Por favor, refiérase a esta página para el actual VRP." #: i2p2www/pages/site/research/vrp.html:10 msgid "This page was last updated in June 2020." -msgstr "" +msgstr "Esta página se actualizó por última vez en junio de 2020." #: i2p2www/pages/site/research/vrp.html:12 msgid "" -"Researchers: while you research/hack, we ask that you refrain from the " -"following: - Performing active exploits or Denial of Service attacks on " -"the\n" -"i2p network - Performing social engineering on i2p development team " -"members - Performing any physical or electronic attempts against i2p " -"property and/or data\n" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" "centers" msgstr "" #: i2p2www/pages/site/research/vrp.html:15 msgid "" -"As i2p is an open-source community, many volunteers and development team " -"members run their own I2P Sites as well as public (“non-private " -"internet”) domains. These\n" -"sites/servers are NOT in the scope of the vulnerability assessment / " -"response process, only the underlying code of i2p is." +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." msgstr "" #: i2p2www/pages/site/research/vrp.html:18 @@ -395,18 +321,13 @@ msgstr "Respuesta al incidente" #: i2p2www/pages/site/research/vrp.html:31 msgid "Researcher submits report via:" -msgstr "" +msgstr "El investigador presenta el informe mediante:" #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." -msgstr "" -"El equipo de respuesta designa un gestor de respuesta que se ocupa del " -"informe\n" -"en particular en base a la disponibilidad y/o al conjunto de " -"conocimientos." +msgstr "El equipo de respuesta designa un gestor de respuesta que se ocupa del informe\nen particular en base a la disponibilidad y/o al conjunto de conocimientos." #: i2p2www/pages/site/research/vrp.html:42 #, python-format @@ -417,14 +338,9 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." -msgstr "" -"El gestor de respuesta formula preguntas para satisfacer cualquier " -"información\n" -"necesaria y para confirmar si la entrega efectivamente indica una " -"vulnerabilidad." +msgstr "El gestor de respuesta formula preguntas para satisfacer cualquier información\nnecesaria y para confirmar si la entrega efectivamente indica una vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:52 msgid "If submission proves to be vulnerable, proceed." @@ -438,34 +354,26 @@ msgstr "Si no indica vulnerabilidad:" msgid "" "Response Manager responds with reasons why submission is not a " "vulnerability." -msgstr "" -"El gestor de respuesta responde con las razones por las que la entrega no" -" indica una vulnerabilidad." +msgstr "El gestor de respuesta responde con las razones por las que la entrega no indica una vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." -msgstr "" -"Si es necesario, el gestor de respuesta mueve la conversación a un " -"'ticket' nuevo o existente en un Trac público." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." +msgstr "Si es necesario, el gestor de respuesta mueve la conversación a un 'ticket' nuevo o existente en un Trac público." #: i2p2www/pages/site/research/vrp.html:70 msgid "" "\n" "Establish severity of vulnerability:\n" " " -msgstr "" -"\n" -"Establezca la gravedad de la vulnerabilidad:" +msgstr "\nEstablezca la gravedad de la vulnerabilidad:" #: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Affects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." -msgstr "" -"Repercute en la red como conjunto, tiene potencial para desbaratar la red" -" entera o está al nivel de una gran catástrofe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." +msgstr "Repercute en la red como conjunto, tiene potencial para desbaratar la red entera o está al nivel de una gran catástrofe." #: i2p2www/pages/site/research/vrp.html:79 msgid "Affects individual routers, or must be carefully exploited." @@ -482,29 +390,20 @@ msgstr "Responda de acuerdo a la gravedad de la vulnerabilidad:" #: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." -msgstr "" -"Las de gravedad ALTA deben notificarse en el sitio web y en la " -"suscripción\n" -"de novedades en %(limit)s días laborables desde su clasificación." +msgstr "Las de gravedad ALTA deben notificarse en el sitio web y en la suscripción\nde novedades en %(limit)s días laborables desde su clasificación." #: i2p2www/pages/site/research/vrp.html:98 -msgid "The notification should list appropriate steps for users to take, if any." -msgstr "" -"La notificación debe, en su caso, enumerar los pasos adecuados a seguir " -"por los usuarios." +msgid "" +"The notification should list appropriate steps for users to take, if any." +msgstr "La notificación debe, en su caso, enumerar los pasos adecuados a seguir por los usuarios." #: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." -msgstr "" -"La notificación no debe incluir detalle alguno que pudiera sugerir una " -"vía para\n" -"explotar la vulnerabilidad." +msgstr "La notificación no debe incluir detalle alguno que pudiera sugerir una vía para\nexplotar la vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:105 msgid "The latter takes precedence over the former." @@ -525,8 +424,8 @@ msgstr "El equipo de respuesta aplica el/los parche(s) apropiado(s)." #: i2p2www/pages/site/research/vrp.html:122 msgid "" "Response Manager works on a patch LOCALLY, patches are shared by the " -"response team via PGP-encrypted e-mail until such a time as it is safe to" -" expose to the public." +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" #: i2p2www/pages/site/research/vrp.html:125 @@ -535,14 +434,9 @@ msgstr "Los parches se revisan con el investigador." #: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." -msgstr "" -"Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante " -"el periodo de revisión no debe hacer referencia a la naturaleza de " -"seguridad del ramal (branch) PRIVADO o de sus consignaciones." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." +msgstr "Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante el periodo de revisión no debe hacer referencia a la naturaleza de seguridad del ramal (branch) PRIVADO o de sus consignaciones." #: i2p2www/pages/site/research/vrp.html:132 msgid "Vulnerability announcement is drafted." @@ -568,33 +462,22 @@ msgstr "Se discute la fecha de publicación." msgid "" "At release date, Response Team coordinates with developers to finalize " "update:" -msgstr "" -"En la fecha de publicación, el equipo de respuesta se coordina con los " -"desarrolladores para culminar la actualización:" +msgstr "En la fecha de publicación, el equipo de respuesta se coordina con los desarrolladores para culminar la actualización:" #: i2p2www/pages/site/research/vrp.html:156 msgid "Response Manager propagates the \"hotfix branch\" to trunk." -msgstr "" -"El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección " -"urgente) a trunk (ramal troncal)." +msgstr "El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección urgente) a trunk (ramal troncal)." #: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." -msgstr "" -"El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad " -"en las notas de la versión." +"Response Manager includes vulnerability announcement draft in release notes." +msgstr "El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad en las notas de la versión." #: i2p2www/pages/site/research/vrp.html:162 msgid "" -"Proceed with the Point or Regular Release. At this time, it is not " -"possible to release an in-network update for only one operating system or" -"\n" -"\t\tarchitecture. In order that all affected products can be released as " -"quickly as possible, the person responsible\n" -"\t\tfor that software should be able to perform necessary release " -"processes in a timely manner. Importantly this should include\n" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" @@ -604,24 +487,20 @@ msgstr "Proceso de divulgación post-publicación" #: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." -msgstr "" -"El equipo de respuesta tiene %(limit)s días para satisfacer todos los " -"puntos dentro de la sección III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." +msgstr "El equipo de respuesta tiene %(limit)s días para satisfacer todos los puntos dentro de la sección III." #: i2p2www/pages/site/research/vrp.html:179 -msgid "If the Incident Response process in section III is successfully completed:" -msgstr "" -"Si el proceso de respuesta a incidente en la sección III se completa con " -"éxito:" +msgid "" +"If the Incident Response process in section III is successfully completed:" +msgstr "Si el proceso de respuesta a incidente en la sección III se completa con éxito:" #: i2p2www/pages/site/research/vrp.html:183 msgid "" "Response Manager contacts researcher and asks if researcher wishes for " "credit." -msgstr "" -"El gestor de respuesta contacta con el investigador y le pregunta si " -"desea aparecer en los créditos." +msgstr "El gestor de respuesta contacta con el investigador y le pregunta si desea aparecer en los créditos." #: i2p2www/pages/site/research/vrp.html:186 msgid "Finalize vulnerability announcement draft and include the following:" @@ -640,10 +519,7 @@ msgid "" "Versions known to be not affected (for example, the vulnerable code was " "introduced in a recent version, and older versions are therefore " "unaffected)." -msgstr "" -"Versiones que se sabe que no están afectadas (por ejemplo, si el código " -"vulnerable fue introducido en una versión reciente, las versiones " -"anteriores no están afectadas)." +msgstr "Versiones que se sabe que no están afectadas (por ejemplo, si el código vulnerable fue introducido en una versión reciente, las versiones anteriores no están afectadas)." #: i2p2www/pages/site/research/vrp.html:199 msgid "Versions not checked." @@ -655,9 +531,7 @@ msgstr "Tipo de vulnerabilidad y su impacto." #: i2p2www/pages/site/research/vrp.html:205 msgid "If already obtained or applicable, a CVE-ID." -msgstr "" -"Si ya se obtuvo o se aplica, un CVE-ID (identificador de " -"vulnerabilidades)." +msgstr "Si ya se obtuvo o se aplica, un CVE-ID (identificador de vulnerabilidades)." #: i2p2www/pages/site/research/vrp.html:208 msgid "The planned, coordinated release date." @@ -667,105 +541,72 @@ msgstr "La fecha planeada de publicación coordinada." msgid "" "Mitigating factors (for example, the vulnerability is only exposed in " "uncommon, non-default configurations)." -msgstr "" -"Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con" -" configuraciones infrecuentes, y no predeterminadas)." +msgstr "Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con configuraciones infrecuentes, y no predeterminadas)." #: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." -msgstr "" -"Soluciones auxiliares (cambios que el usuario puede hacer en la " -"configuración para reducir su exposición a la vulnerabilidad)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." +msgstr "Soluciones auxiliares (cambios que el usuario puede hacer en la configuración para reducir su exposición a la vulnerabilidad)." #: i2p2www/pages/site/research/vrp.html:217 msgid "If applicable, credits to the original reporter." msgstr "Si se aplica, créditos al informante original." #: i2p2www/pages/site/research/vrp.html:222 -msgid "Release finalized vulnerability announcement on website and in news feed." -msgstr "" -"Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y" -" en la suscripción de novedades." +msgid "" +"Release finalized vulnerability announcement on website and in news feed." +msgstr "Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y en la suscripción de novedades." #: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" -msgstr "" -"Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la " -"versión en listas de correo bien-conocidas:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" +msgstr "Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la versión en listas de correo bien-conocidas:" #: i2p2www/pages/site/research/vrp.html:238 msgid "If applicable, developers request a CVE-ID." -msgstr "" -"Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de " -"vulnerabilidad)." +msgstr "Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de vulnerabilidad)." #: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." -msgstr "" -"Se hace referencia también a la consignación (commit) que aplicó la " -"corrección en una futura consignación, y se incluye un CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." +msgstr "Se hace referencia también a la consignación (commit) que aplicó la corrección en una futura consignación, y se incluye un CVE-ID." #: i2p2www/pages/site/research/vrp.html:250 msgid "" "If the Incident Response process in section III is *not* successfully " "completed:" -msgstr "" -"Si el proceso de respuesta a incidente en la sección III *no* se completó" -" con éxito:" +msgstr "Si el proceso de respuesta a incidente en la sección III *no* se completó con éxito:" #: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." -msgstr "" -"El equipo de respuesta y los desarolladores organizan una reunión en el " -"IRC para\n" -"discutir por qué y qué puntos de la sección III no se resolvieron, y cómo" -" puede el equipo resolverlos en el futuro." +msgstr "El equipo de respuesta y los desarolladores organizan una reunión en el IRC para\ndiscutir por qué y qué puntos de la sección III no se resolvieron, y cómo puede el equipo resolverlos en el futuro." #: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." -msgstr "" -"Cualquier reunión de desarrolladores inmediatamente a continuación del " -"incidente\n" -"debe incluir los puntos en la sección V." +msgstr "Cualquier reunión de desarrolladores inmediatamente a continuación del incidente\ndebe incluir los puntos en la sección V." #: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." -msgstr "" -"Si surgen disputas acerca de si divulgar o no información acerca de una\n" -"vulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá " -"públicamente\n" -"el problema en el IRC e intentará alcanzar un consenso." +msgstr "Si surgen disputas acerca de si divulgar o no información acerca de una\nvulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá públicamente\nel problema en el IRC e intentará alcanzar un consenso." #: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." -msgstr "" -"Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\n" -"de %(limit)s días), el investigador (tras %(limit)s días) está totalmente" -"\n" -"legitimado para exponer la vulnerabilidad al público." +msgstr "Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\nde %(limit)s días), el investigador (tras %(limit)s días) está totalmente\nlegitimado para exponer la vulnerabilidad al público." #: i2p2www/pages/site/research/vrp.html:277 msgid "Incident Analysis" @@ -777,10 +618,9 @@ msgstr "Aislar el código base" #: i2p2www/pages/site/research/vrp.html:282 #: i2p2www/pages/site/research/vrp.html:302 -msgid "Response Team and developers should coordinate to work on the following:" -msgstr "" -"El equipo de respuesta y los desarrolladores deben coordinarse para " -"trabajar en lo siguiente:" +msgid "" +"Response Team and developers should coordinate to work on the following:" +msgstr "El equipo de respuesta y los desarrolladores deben coordinarse para trabajar en lo siguiente:" #: i2p2www/pages/site/research/vrp.html:286 msgid "Problematic implementation of classes/libraries/functions, etc." @@ -800,9 +640,7 @@ msgstr "Auditoría" #: i2p2www/pages/site/research/vrp.html:306 msgid "Auditing of problem area(s) as discussed in point 1." -msgstr "" -"Auditado de la(s) área(s) problemáticas tal como se discutió en el punto " -"1." +msgstr "Auditado de la(s) área(s) problemáticas tal como se discutió en el punto 1." #: i2p2www/pages/site/research/vrp.html:309 msgid "Generate internal reports and store for future reference." @@ -810,22 +648,15 @@ msgstr "Generar informes internos y almacenarlos para futura referencia." #: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." -msgstr "" -"Si los resultados no son información sensible, compartirlos con el " -"público vía IRC o mediante el Trac público." +"If results are not sensitive, share with the public via IRC or public Trac." +msgstr "Si los resultados no son información sensible, compartirlos con el público vía IRC o mediante el Trac público." #: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." -msgstr "" -"El equipo de respuesta dispone de %(limit)s días tras completar la " -"sección III\n" -"para asegurar el completado de la sección V." +msgstr "El equipo de respuesta dispone de %(limit)s días tras completar la sección III\npara asegurar el completado de la sección V." #: i2p2www/pages/site/research/vrp.html:326 msgid "Resolutions" @@ -833,17 +664,10 @@ msgstr "Resoluciones" #: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" -msgstr "" -"En relación a el/los incidente(s), cualquier pregunta o resolución " -"adicional\n" -"entre el investigador y el equipo de respuesta y desarrollo tras la " -"divulgación\n" -"pública, puede ser abordado mediante lo siguiente:" +msgstr "En relación a el/los incidente(s), cualquier pregunta o resolución adicional\nentre el investigador y el equipo de respuesta y desarrollo tras la divulgación\npública, puede ser abordado mediante lo siguiente:" #: i2p2www/pages/site/research/vrp.html:341 msgid "Continuous Improvement" @@ -851,22 +675,15 @@ msgstr "Mejora continua" #: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." -msgstr "" -"El equipo de respuesta y los desarrolladores deben mantener reuniones " -"anuales\n" -"para revisar los incidentes del año anterior." +msgstr "El equipo de respuesta y los desarrolladores deben mantener reuniones anuales\npara revisar los incidentes del año anterior." #: i2p2www/pages/site/research/vrp.html:349 msgid "" "Response Team or designated person(s) should give a brief presentation, " "including:" -msgstr "" -"El equipo de respuesta o la(s) persona(s) designada(s) debe(n) " -"proporcionar una\n" -"presentación breve, incluyendo:" +msgstr "El equipo de respuesta o la(s) persona(s) designada(s) debe(n) proporcionar una\npresentación breve, incluyendo:" #: i2p2www/pages/site/research/vrp.html:353 msgid "Areas of I2P affected by the incidents." @@ -874,15 +691,11 @@ msgstr "Áreas de I2P afectadas por los incidentes." #: i2p2www/pages/site/research/vrp.html:356 msgid "Any network downtime or monetary cost (if any) of the incidents." -msgstr "" -"Cualquier periodo de inactividad de la red o coste monetario (en su caso)" -" de los incidentes." +msgstr "Cualquier periodo de inactividad de la red o coste monetario (en su caso) de los incidentes." #: i2p2www/pages/site/research/vrp.html:359 msgid "Ways in which the incidents could have been avoided (if any)." -msgstr "" -"Maneras en las que los incidentes podrían haber sido evitados (en su " -"caso)." +msgstr "Maneras en las que los incidentes podrían haber sido evitados (en su caso)." #: i2p2www/pages/site/research/vrp.html:362 msgid "How effective this process was in dealing with the incidents." @@ -890,17 +703,12 @@ msgstr "En qué medida fue efectivo este proceso para encargarse de los incident #: i2p2www/pages/site/research/vrp.html:368 msgid "After the presentation, Response Team and developers should discuss:" -msgstr "" -"Tras la presentación, el equipo de respuesta y los desarrolladores deben " -"discutir:" +msgstr "Tras la presentación, el equipo de respuesta y los desarrolladores deben discutir:" #: i2p2www/pages/site/research/vrp.html:372 msgid "Potential changes to development processes to reduce future incidents." -msgstr "" -"Cambios potenciales en el desarrollo de procesos para reducir futuros " -"incidentes." +msgstr "Cambios potenciales en el desarrollo de procesos para reducir futuros incidentes." #: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "Cambios potenciales en este proceso para mejorar futuras respuestas." - diff --git a/i2p2www/translations/es_AR/LC_MESSAGES/priority.po b/i2p2www/translations/es_AR/LC_MESSAGES/priority.po index e782a5d0..c939f22d 100644 --- a/i2p2www/translations/es_AR/LC_MESSAGES/priority.po +++ b/i2p2www/translations/es_AR/LC_MESSAGES/priority.po @@ -1,23 +1,22 @@ -# Spanish (Argentina) translations for I2P. +# Translations template for I2P. # Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-11-08 21:15+0000\n" "PO-Revision-Date: 2013-02-03 00:02+0000\n" "Last-Translator: FULL NAME \n" -"Language-Team: Spanish (Argentina) " -"(http://app.transifex.com/otf/I2P/language/es_AR/)\n" -"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 " -"? 1 : 2\n" +"Language-Team: Spanish (Argentina) (http://app.transifex.com/otf/I2P/language/es_AR/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es_AR\n" +"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" @@ -56,14 +55,10 @@ msgstr "Autor:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P and to utilize the outproxies available within I2P. Below are " +"Your web browser will need to be configured in order to browse web sites on " +"I2P and to utilize the outproxies available within I2P. Below are " "walkthroughs for some of the most popular browsers." -msgstr "" -"Su navegador web deberá ser configurado para poder navegar por sitios web" -" en I2P y para utilizar los outproxies disponibles en I2P. A " -"continuación, se presentan guías para algunos de los navegadores más " -"populares." +msgstr "Su navegador web deberá ser configurado para poder navegar por sitios web en I2P y para utilizar los outproxies disponibles en I2P. A continuación, se presentan guías para algunos de los navegadores más populares." #: i2p2www/pages/downloads/browser-content.html:3 msgid "Firefox Profile for Windows" @@ -72,21 +67,15 @@ msgstr "Perfil de Firefox para Windows" #: i2p2www/pages/downloads/browser-content.html:4 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" " Firefox profile." -msgstr "" -"Si utiliza Windows, la forma recomendada de acceder a I2P es utilizando " -"el\n" -" perfil de Firefox." +msgstr "Si utiliza Windows, la forma recomendada de acceder a I2P es utilizando el\n perfil de Firefox." #: i2p2www/pages/downloads/browser-content.html:6 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -" configure your browser yourself. Read below on how to that." -msgstr "" -"Si no desea utilizar ese perfil o no está en Windows, tiene que " -"configurar su navegador usted mismo. Lea a continuación cómo hacerlo." +"If you do not wish to use that profile or are not on Windows, you need to " +"configure your browser yourself. Read below on how to that." +msgstr "Si no desea utilizar ese perfil o no está en Windows, tiene que configurar su navegador usted mismo. Lea a continuación cómo hacerlo." #: i2p2www/pages/downloads/browser-content.html:8 msgid "How to configure your browser" @@ -103,51 +92,30 @@ msgstr "Configuración basada en extensiones: I2P en la navegación privada" #: i2p2www/pages/downloads/browser-content.html:21 msgid "" -"A new way of automatically configuring the I2P Browser is currently being" -" tested. It uses the Firefox's \"Container Tabs\" to build private " -"browsing tools for use with I2P and I2P applications." -msgstr "" -"Actualmente se está probando una nueva forma de configurar " -"automáticamente el navegador I2P. Utiliza las \"pestañas contenedoras\" " -"de Firefox para construir herramientas de navegación privada para su uso " -"con I2P y aplicaciones I2P." +"A new way of automatically configuring the I2P Browser is currently being " +"tested. It uses the Firefox's \"Container Tabs\" to build private browsing " +"tools for use with I2P and I2P applications." +msgstr "Actualmente se está probando una nueva forma de configurar automáticamente el navegador I2P. Utiliza las \"pestañas contenedoras\" de Firefox para construir herramientas de navegación privada para su uso con I2P y aplicaciones I2P." #: i2p2www/pages/downloads/browser-content.html:22 msgid "" -"It does pre-configuration of your browser by enabling some of the privacy" -" Browser Settings like ResistFingerprinting, and enforces WebRTC proxy " -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving Firefox's integration\n" -" with I2P. It should not substantially interfere with your non-I2P " -"Firefox tabs. " -msgstr "" -"Realiza la preconfiguración de tu navegador habilitando algunos de los " -"Ajustes de privacidad del navegador como ResistFingerprinting, e impone " -"la obediencia al proxy WebRTC. También contiene menús, accesos directos y" -" herramientas de supervisión que mejoran la integración de Firefox con " -"I2P.\n" -" con I2P. No debería interferir sustancialmente con tus pestañas " -"Firefox no I2P. " +"It does pre-configuration of your browser by enabling some of the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy obedience. It also contains menus, shortcuts, and monitoring tools improving Firefox's integration\n" +" with I2P. It should not substantially interfere with your non-I2P Firefox tabs. " +msgstr "Realiza la preconfiguración de tu navegador habilitando algunos de los Ajustes de privacidad del navegador como ResistFingerprinting, e impone la obediencia al proxy WebRTC. También contiene menús, accesos directos y herramientas de supervisión que mejoran la integración de Firefox con I2P.\n con I2P. No debería interferir sustancialmente con tus pestañas Firefox no I2P. " #: i2p2www/pages/downloads/browser-content.html:24 msgid "" -"The extension, I2P in Private Browsing, can be obtained " -"from the Mozilla addon store. " -msgstr "" -"La extensión, I2P in Private Browsing, puede obtenerse " -"en la tienda de complementos de Mozilla. " +"The extension, I2P in Private Browsing, can" +" be obtained from the Mozilla addon store. " +msgstr "La extensión, I2P in Private Browsing, puede obtenerse en la tienda de complementos de Mozilla. " #: i2p2www/pages/downloads/browser-content.html:25 msgid "" "The source code for the extension is available at i2pgit.org. " -msgstr "" -"El código fuente de la extensión está disponible en i2pgit.org. " +msgstr "El código fuente de la extensión está disponible en i2pgit.org. " #: i2p2www/pages/downloads/browser-content.html:26 msgid "Instructions for Firefox 57 and above:" @@ -155,14 +123,10 @@ msgstr "Instrucciones para Firefox 57 y superiores:" #: i2p2www/pages/downloads/browser-content.html:27 msgid "" -"From the Menu button in the top right, select Preferences. " -"Scroll down until you see the Network Proxy section, as shown in" -" the screenshot below. Click on Settings" -msgstr "" -"En el botón Menú de la parte superior derecha, seleccione " -"Preferencias. Desplácese hacia abajo hasta que vea la sección " -"Proxy de red, como se muestra en la siguiente captura de " -"pantalla. Haga clic en Configuración" +"From the Menu button in the top right, select Preferences. Scroll " +"down until you see the Network Proxy section, as shown in the " +"screenshot below. Click on Settings" +msgstr "En el botón Menú de la parte superior derecha, seleccione Preferencias. Desplácese hacia abajo hasta que vea la sección Proxy de red, como se muestra en la siguiente captura de pantalla. Haga clic en Configuración" #: i2p2www/pages/downloads/browser-content.html:28 msgid "Firefox57 Network Options" @@ -172,17 +136,14 @@ msgstr "Opciones de red de Firefox57" msgid "" "In the Connection Settings pop-up, select Manual proxy\n" " configuration. Set both the HTTP and SSL Proxy to address\n" -" 127.0.0.1 with port 4444 as shown in the " -"following screenshot." -msgstr "" +" 127.0.0.1 with port 4444 as shown in the following screenshot." +msgstr "En la ventana emergente Configuración de la conexión seleccione Configuración manual \n del proxy. Establezca tanto el proxy HTTP como el SSL en la dirección\n 127.0.0.1 con el puerto4444 como se muestra en la siguiente captura de pantalla." #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "Firefox57\n" "Connection Settings" -msgstr "" -"Firefox57\n" -"Configuración de la conexión" +msgstr "Firefox57\nConfiguración de la conexión" #: i2p2www/pages/downloads/browser-content.html:34 msgid "Firefox57 Connection Settings" @@ -192,18 +153,13 @@ msgstr "Configuración de conexión de Firefox57" msgid "" "Finally, go to the address about:config and find the property " "media.peerConnection.ice.proxy_only. Ensure that this setting is True." -msgstr "" -"Por último, vaya a la dirección about:config y busque la " -"propiedad media.peerConnection.ice.proxy_only. Asegúrese de que esta " -"configuración es True." +msgstr "Por último, vaya a la dirección about:config y busque la propiedad media.peerConnection.ice.proxy_only. Asegúrese de que esta configuración es True." #: i2p2www/pages/downloads/browser-content.html:37 msgid "" "Firefox57\n" "PeerConnection Settings" -msgstr "" -"Firefox57\n" -"Configuración de PeerConnection" +msgstr "Firefox57\nConfiguración de PeerConnection" #: i2p2www/pages/downloads/browser-content.html:38 msgid "Firefox57 PeerConnection Settings" @@ -217,19 +173,12 @@ msgstr " Chrome " msgid "" "Extension-based Configuration: I2PChrome.js(Experimental, additional " "configuration)" -msgstr "" +msgstr "Configuración basada en extensiones: I2PChrome.js(Experimental, configuración adicional)" #: i2p2www/pages/downloads/browser-content.html:43 msgid "" -"An experimental, partially-automated configuration process for Chrome is " -"available. In order to configure it, create a new Profile " -"especially for your I2P browsing, separate from the default profile. Then" -" install this Extension" -" in your newly-created profile. This profile is now configured to use " -"I2P. Highly detailed instructions are available at the\n" -" homepage. " +"An experimental, partially-automated configuration process for Chrome is available. In order to configure it, create a new Profile especially for your I2P browsing, separate from the default profile. Then install this Extension in your newly-created profile. This profile is now configured to use I2P. Highly detailed instructions are available at the\n" +" homepage. " msgstr "" #: i2p2www/pages/downloads/browser-content.html:45 @@ -238,12 +187,8 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:46 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their proxy settings depending on variant and platform. These " -"instructions may be slightly different in Brave or Iridium, for instance." -" From the Main menu, navigate\n" -" to the Settings, and search for the menu item. " -"Clicking it will open the right settings for your platform." +"Chromium-Based Browsers like Chrome have slightly different places for their proxy settings depending on variant and platform. These instructions may be slightly different in Brave or Iridium, for instance. From the Main menu, navigate\n" +" to the Settings, and search for the menu item. Clicking it will open the right settings for your platform." msgstr "" #: i2p2www/pages/downloads/browser-content.html:48 @@ -252,9 +197,9 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:49 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used by Internet Explorer, and you can " -"configure it by following the Internet Explorer 8 guide." +"On Windows, this button will launch you into the shared proxy settings used " +"by Internet Explorer, and you can configure it" +" by following the Internet Explorer 8 guide." msgstr "" #: i2p2www/pages/downloads/browser-content.html:52 @@ -267,36 +212,24 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:54 msgid "" -"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an " -"about:config page for you to configure proxy settings manually. It is " -"further not possible to use most extensions in Fenix-based Firefoxes. It " -"is possible to enable support\n" -" about:config and enable more extensions in Firefox Nightly at the " -"time of this writing, but it's a manual and difficult process. " -"IceRaven is a fork of Firefox which enables a collection of " -"extensions while Mozilla and the Mozilla Community\n" -" work on adding support for extensions to Firefox for Android. It " -"provides the easiest way of configuring a modern Firefox-based Browser " -"for Android. It does not come from Mozilla and carries no guarantees from" -" them. Installing the extension\n" +"Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have an about:config page for you to configure proxy settings manually. It is further not possible to use most extensions in Fenix-based Firefoxes. It is possible to enable support\n" +" about:config and enable more extensions in Firefox Nightly at the time of this writing, but it's a manual and difficult process. IceRaven is a fork of Firefox which enables a collection of extensions while Mozilla and the Mozilla Community\n" +" work on adding support for extensions to Firefox for Android. It provides the easiest way of configuring a modern Firefox-based Browser for Android. It does not come from Mozilla and carries no guarantees from them. Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P." msgstr "" #: i2p2www/pages/downloads/browser-content.html:58 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been using IceRaven for a while, go to the main menu, select the History " -"tab, and make sure that you have cleared information about your past " -"browsing by tapping the \"Delete\n" +"If you have not installed IceRaven yet, go to the next step. If you have been using IceRaven for a while, go to the main menu, select the History tab, and make sure that you have cleared information about your past browsing by tapping the \"Delete\n" " History\" button." msgstr "" #: i2p2www/pages/downloads/browser-content.html:60 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-" -"Ons\" submenu. Install the extension named I2P Proxy for Android and " -"other Systems. " +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-" +"Ons\" submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" " +"submenu. Install the extension named I2P Proxy for Android and other " +"Systems. " msgstr "" #: i2p2www/pages/downloads/browser-content.html:61 @@ -305,31 +238,21 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:62 msgid "" -"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web " -"browsers, if installed from the following addons.mozilla.org URL.\n" -" I2P Proxy for Android and Other Systems\n" +"This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web browsers, if installed from the following addons.mozilla.org URL.\n" +" I2P Proxy for Android and Other Systems\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:65 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." +"This extension is identical to the Chromium extension and is built from the " +"same source." msgstr "" #: i2p2www/pages/downloads/browser-content.html:66 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their Blog" -msgstr "" -"Para habilitar el soporte de extensiones en Firefox Nightly, debes seguir" -"\n" -"los pasos proporcionados por Mozilla en su Blog" +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their Blog" +msgstr "Para habilitar el soporte de extensiones en Firefox Nightly, debes seguir\nlos pasos proporcionados por Mozilla en su Blog" #: i2p2www/pages/downloads/browser-content.html:71 msgid "Internet Explorer" @@ -337,16 +260,10 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:72 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." -msgstr "" -"En el menú de inicio, busque \"Configuración de red e Internet\" para " -"abrir la configuración.\n" -"configuración. La última entrada en el menú es la Configuración del " -"proxy, haga clic en él para\n" -"su proxy para conectarse a I2P." +msgstr "En el menú de inicio, busque \"Configuración de red e Internet\" para abrir la configuración.\nconfiguración. La última entrada en el menú es la Configuración del proxy, haga clic en él para\nsu proxy para conectarse a I2P." #: i2p2www/pages/downloads/browser-content.html:77 msgid "IE Internet Options" @@ -354,21 +271,12 @@ msgstr "Opciones de Internet de IE" #: i2p2www/pages/downloads/browser-content.html:78 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." -msgstr "" -"Ahora active en la casilla de confirmación \"usar un servidor proxy para " -"la LAN\" y también en \"Ignorar servidor para conexiones locales\". " -"Pulsando en opciones avanzadas abrirá la ventana para abrir puertos. " -"Entre los valores de la imagen, IP 127.0.0.1y puerto 4444 para HTTP, " -"puerto 4445 para HTTPS." +msgstr "Ahora active en la casilla de confirmación \"usar un servidor proxy para la LAN\" y también en \"Ignorar servidor para conexiones locales\". Pulsando en opciones avanzadas abrirá la ventana para abrir puertos. Entre los valores de la imagen, IP 127.0.0.1y puerto 4444 para HTTP, puerto 4445 para HTTPS." #: i2p2www/pages/downloads/browser-content.html:85 msgid "IE Proxy Settings" @@ -378,46 +286,34 @@ msgstr "Configuración proxy en IE" msgid "" "I2P is not designed for creating proxies to the Internet.\n" "Instead, it is meant to be used as an internal network." -msgstr "" -"I2P no está diseñado para crear proxies hacia Internet.\n" -"Por el contrario, está pensada para utilizarse como red interna." +msgstr "I2P no está diseñado para crear proxies hacia Internet.\nPor el contrario, está pensada para utilizarse como red interna." #: i2p2www/pages/downloads/browser-content.html:94 msgid "" -"

    The I2P project itself does not run any proxies to the " -"Internet.\n" -"The I2P software includes a default outproxy: exit.stormycloud.i2p.\n" -"These are run by a volunteer.

    \n" -"https://stormycloud.org" -msgstr "" -"

    The I2P project itself does not run any proxies to the " -"Internet.\n" +"

    The I2P project itself does not run any proxies to the Internet.\n" "The I2P software includes a default outproxy: exit.stormycloud.i2p.\n" "These are run by a volunteer.

    \n" "https://stormycloud.org" +msgstr "

    The I2P project itself does not run any proxies to the Internet.\nThe I2P software includes a default outproxy: exit.stormycloud.i2p.\nThese are run by a volunteer.

    \nhttps://stormycloud.org" #: i2p2www/pages/downloads/browser-content.html:101 #, python-format -msgid "By default, I2P comes with one outproxy configured: %(http)s." +msgid "" +"By default, I2P comes with one outproxy configured: %(http)s." msgstr "Por defecto, I2P viene con un outproxy configurado: %(http)s." #: i2p2www/pages/downloads/browser-content.html:104 msgid "" "I2P Sites that are accessible via .i2p addresses are also\n" "not allowed via the outproxies." -msgstr "" -"Los sitios I2P accesibles a través de direcciones .i2p tampoco están\n" -"no están permitidos a través de los outproxies." +msgstr "Los sitios I2P accesibles a través de direcciones .i2p tampoco están\nno están permitidos a través de los outproxies." #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Tor provides a browser to use " -"as an outproxy to the Internet." -msgstr "" -"Tor proporciona un navegador " -"para utilizar como outproxy a Internet." +"Tor provides a browser to use as " +"an outproxy to the Internet." +msgstr "Tor proporciona un navegador para utilizar como outproxy a Internet." #: i2p2www/pages/downloads/config.html:2 i2p2www/pages/site/faq.html:19 msgid "Configuration" @@ -433,9 +329,7 @@ msgstr "Debian o Ubuntu, todas las versiones" #: i2p2www/pages/downloads/debian.html:7 msgid "The Debian packages should work on most platforms running:" -msgstr "" -"Los paquetes de Debian deberían funcionar en la mayoría de las " -"plataformas en ejecución:" +msgstr "Los paquetes de Debian deberían funcionar en la mayoría de las plataformas en ejecución:" #: i2p2www/pages/downloads/debian.html:9 msgid "Ubuntu (Bionic 18.04 and newer)" @@ -452,8 +346,7 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:15 #, python-format msgid "" -"The I2P packages may work on systems not listed above. Please " -"report any issues\n" +"The I2P packages may work on systems not listed above. Please report any issues\n" "with these packages on Gitlab at\n" "i2p.i2p." msgstr "" @@ -462,9 +355,7 @@ msgstr "" msgid "" "Option 1: Recent versions of Ubuntu and its " "derivatives (Try this if you're not using Debian)" -msgstr "" -"Opción 1: Versiones recientes de Ubuntu y sus " -"derivados (Pruebe esto si no usa Debian)" +msgstr "Opción 1: Versiones recientes de Ubuntu y sus derivados (Pruebe esto si no usa Debian)" #: i2p2www/pages/downloads/debian.html:22 msgid "Option 2: Debian (including Debian-derivatives)" @@ -484,17 +375,10 @@ msgstr "Abra un terminal e introduzca:" #: i2p2www/pages/downloads/debian.html:31 msgid "" -"This command will add the PPA to /etc/apt/sources.list.d and" -" fetch\n" -"the gpg key that the repository has been signed with. The GPG key ensures" -"\n" +"This command will add the PPA to /etc/apt/sources.list.d and fetch\n" +"the gpg key that the repository has been signed with. The GPG key ensures\n" "that the packages have not been tampered with since being built." -msgstr "" -"Este comando añadirá el PPA a /etc/apt/sources.list.d y " -"obtendrá\n" -"la clave gpg con la que se ha firmado el repositorio. La clave GPG " -"asegura\n" -"que los paquetes no han sido manipulados desde su creación." +msgstr "Este comando añadirá el PPA a /etc/apt/sources.list.d y obtendrá\nla clave gpg con la que se ha firmado el repositorio. La clave GPG asegura\nque los paquetes no han sido manipulados desde su creación." #: i2p2www/pages/downloads/debian.html:38 msgid "Notify your package manager of the new PPA by entering:" @@ -505,10 +389,7 @@ msgid "" "This command will retrieve the latest list of software from each\n" "repository that is enabled on your system, including the I2P PPA that\n" "was added with the earlier command." -msgstr "" -"Este comando obtendrá la última lista de aplicaciones de cada\n" -"repositorio que esté habilitado en su sistema, incluyendo\n" -"el PPA de I2P que hemos añadido anteriormente." +msgstr "Este comando obtendrá la última lista de aplicaciones de cada\nrepositorio que esté habilitado en su sistema, incluyendo\nel PPA de I2P que hemos añadido anteriormente." #: i2p2www/pages/downloads/debian.html:46 msgid "You are now ready to install I2P!" @@ -526,18 +407,13 @@ msgstr "Abra \"Software y actualizaciones\" a través del menú de aplicaciones. msgid "" "Select the \"Other Software\" tab and click the \"Add\" button at the\n" " bottom to configure the PPA." -msgstr "" -"Seleccione la pestaña \"Otro software\" y haga clic en el botón " -"\"Añadir\" en la parte inferior para configurar el PPA.\n" -" inferior para configurar el PPA." +msgstr "Seleccione la pestaña \"Otro software\" y haga clic en el botón \"Añadir\" en la parte inferior para configurar el PPA.\n inferior para configurar el PPA." #: i2p2www/pages/downloads/debian.html:64 msgid "" "Add the PPA by pasting the URL: ppa:i2p-maintainers/i2p\n" " into the PPA dialog." -msgstr "" -"Añade el PPA pegando la URL: ppa:i2p-maintainers/i2p\n" -" en el diálogo PPA." +msgstr "Añade el PPA pegando la URL: ppa:i2p-maintainers/i2p\n en el diálogo PPA." #: i2p2www/pages/downloads/debian.html:70 msgid "Download the repository information with the \"Reload\" button." @@ -547,19 +423,13 @@ msgstr "Descargue la información del repositorio con el botón \"Recargar\"." msgid "" "Install the I2P software using the \"Software\" tool from the\n" " applications menu." -msgstr "" -"Instale el software I2P mediante la herramienta \"Software\" del menú\n" -" menú de aplicaciones." +msgstr "Instale el software I2P mediante la herramienta \"Software\" del menú\n menú de aplicaciones." #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of starting I2P and configuring " -"it for your system." -msgstr "" -"Tras completar el proceso de instalación puede pasar a la siguiente\n" -"parte de la inicialización de I2P, y " -"configurarlo para su sistema." +"part of starting I2P and configuring it for your system." +msgstr "Tras completar el proceso de instalación puede pasar a la siguiente\nparte de la inicialización de I2P, y configurarlo para su sistema." #: i2p2www/pages/downloads/debian.html:87 msgid "Instructions for Debian" @@ -571,35 +441,29 @@ msgstr "Arquitecturas actualmente soportadas" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with su or by prefixing each command with " -"sudo)." +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with su or by prefixing each command with sudo)." msgstr "" #: i2p2www/pages/downloads/debian.html:96 msgid "" -"Ensure that apt-transport-https, curl, lsb-release are installed." +"Ensure that apt-transport-https, curl, lsb-" +"release are installed." msgstr "" #: i2p2www/pages/downloads/debian.html:103 #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the Debian wiki\n" +" Check which version of Debian you are using on this page at the Debian wiki\n" " and verify with %(file2)s on your system.\n" -" Then, for Debian Bullseye or newer distributions run the following " -"command to create %(file)s." +" Then, for Debian Bullseye or newer distributions run the following command to create %(file)s." msgstr "" #: i2p2www/pages/downloads/debian.html:125 #, python-format msgid "Download the key used to sign the repository:" -msgstr "" -"Descargue la clave utilizada para firmar el " -"repositorio:" +msgstr "Descargue la clave utilizada para firmar el repositorio:" #: i2p2www/pages/downloads/debian.html:135 msgid "Display the key fingerprint." @@ -620,28 +484,22 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:168 msgid "" "This command will retrieve the latest list of software\n" -" from every repository enabled on your system, including the I2P " -"repository\n" +" from every repository enabled on your system, including the I2P repository\n" " added in step 1." msgstr "" #: i2p2www/pages/downloads/debian.html:175 msgid "" -"You are now ready to install I2P! Installing the i2p-keyring" -"\n" -" package will ensure that you receive updates to the repository's GPG " -"key." +"You are now ready to install I2P! Installing the i2p-keyring\n" +" package will ensure that you receive updates to the repository's GPG key." msgstr "" #: i2p2www/pages/downloads/debian.html:185 msgid "" -"After the installation process completes you can move on to the next part" -" of starting I2P and configuring it " -"for your system." -msgstr "" -"Tras completar el proceso de instalación puede pasar a la siguiente parte" -" de la inicialización de I2P, y " -"configurarlo para su sistema." +"After the installation process completes you can move on to the next part of" +" starting I2P and configuring it for your" +" system." +msgstr "Tras completar el proceso de instalación puede pasar a la siguiente parte de la inicialización de I2P, y configurarlo para su sistema." #: i2p2www/pages/downloads/debian.html:190 #: i2p2www/pages/downloads/post-install.html:1 @@ -652,90 +510,51 @@ msgstr "Tareas post-instalación" msgid "" "Using these I2P packages the I2P router can be started in the following\n" "three ways:" -msgstr "" -"El router I2P se puede iniciar usando estos paquetes I2P de las tres " -"maneras siguientes:" +msgstr "El router I2P se puede iniciar usando estos paquetes I2P de las tres maneras siguientes:" #: i2p2www/pages/downloads/debian.html:198 msgid "" -""on demand" using the i2prouter script. Simply run " -""i2prouter\n" -"start" from a command prompt. (Note: Do " -"not use\n" +""on demand" using the i2prouter script. Simply run "i2prouter\n" +"start" from a command prompt. (Note: Do not use\n" "sudo or run it as root!)" -msgstr "" -""a petición" usando el script i2prouter. Simplemente ejecute\n" -""i2prouter start" en una línea de comandos.\n" -"(Nota: ¡No utilice sudo ni lo ejecute como root!)" +msgstr ""a petición" usando el script i2prouter. Simplemente ejecute\n"i2prouter start" en una línea de comandos.\n(Nota: ¡No utilice sudo ni lo ejecute como root!)" #: i2p2www/pages/downloads/debian.html:205 msgid "" -""on demand" without the java service wrapper\n" -"(needed on non-Linux/non-x86 systems) by running \"i2prouter-" -"nowrapper\".\n" +""on demand" without the java service wrapper\n" +"(needed on non-Linux/non-x86 systems) by running \"i2prouter-nowrapper\".\n" "(Note: Do not\n" "use sudo or run it as root!)" -msgstr "" -""a petición" sin el java service " -"wrapper (encapsulador como servicio para java, \n" -"necesario en sistemas no-Linux/no-x86) ejecutando \"i2prouter-" -"nowrapper\".\n" -"(Nota: ¡No utilice sudo ni lo ejecute como root!)" +msgstr ""a petición" sin el java service wrapper (encapsulador como servicio para java, \nnecesario en sistemas no-Linux/no-x86) ejecutando \"i2prouter-nowrapper\".\n(Nota: ¡No utilice sudo ni lo ejecute como root!)" #: i2p2www/pages/downloads/debian.html:213 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"dpkg-" -"reconfigure\n" -"i2p\" as root or using sudo. This is the recommended means of " -"operation." -msgstr "" -"como un servicio que se ejecuta automáticamente al arrancar el sistema, \n" -"incluso antes de abrir sesión de usuario del sistema. Este servicio puede" -" \n" -"activarse ejecutando \"dpkg-reconfigure i2p\" como root, o " -"usando sudo. \n" -"Esta es la forma recomendada de hacerlo." +"before logging in. The service can be enabled with \"dpkg-reconfigure\n" +"i2p\" as root or using sudo. This is the recommended means of operation." +msgstr "como un servicio que se ejecuta automáticamente al arrancar el sistema, \nincluso antes de abrir sesión de usuario del sistema. Este servicio puede \nactivarse ejecutando \"dpkg-reconfigure i2p\" como root, o usando sudo. \nEsta es la forma recomendada de hacerlo." #: i2p2www/pages/downloads/debian.html:221 msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" -"if you can. The ports to forward can be found on the \n" -"network configuration page in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find portforward.com to be" -" helpful." -msgstr "" -"Si puede, cuando instale por primera vez, recuerde ajustar su " -"NAT/cortafuegos. Los puertos a abrir pueden verse en la web de configuración de la " -"red en la consola del ruter. Si necesita un guía para abrir sus " -"puertos, la web portforward.com " -"puede serle de utilidad." +"When installing for the first time, please remember to adjust your NAT/firewall\n" +"if you can. The ports to forward can be found on the \n" +"network configuration page in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find portforward.com to be helpful." +msgstr "Si puede, cuando instale por primera vez, recuerde ajustar su NAT/cortafuegos. Los puertos a abrir pueden verse en la web de configuración de la red en la consola del ruter. Si necesita un guía para abrir sus puertos, la web portforward.com puede serle de utilidad." #: i2p2www/pages/downloads/debian.html:228 msgid "" "Please review and adjust the bandwidth settings on the\n" "configuration page,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." -msgstr "" -"Por favor revise y ajuste las configuraciones de ancho de banda\n" -"en la página de " -"configuración, ya que los valores por defecto de\n" -"96 KB/s de bajada / 40 KB/s de subida son bastante conservadores. " +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." +msgstr "Por favor revise y ajuste las configuraciones de ancho de banda\nen la página de configuración, ya que los valores por defecto de\n96 KB/s de bajada / 40 KB/s de subida son bastante conservadores. " #: i2p2www/pages/downloads/debian.html:234 #: i2p2www/pages/downloads/post-install.html:34 #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the browser proxy setup page for an easy " -"howto." +"href=\"%(browserconfig)s\">browser proxy setup page for an easy howto." msgstr "" #: i2p2www/pages/downloads/docker.html:5 @@ -748,8 +567,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:7 msgid "" -"If you just want to give I2P a quick try or are using it in a home " -"network, follow these steps" +"If you just want to give I2P a quick try or are using it in a home network, " +"follow these steps" msgstr "" #: i2p2www/pages/downloads/docker.html:9 @@ -773,8 +592,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:24 msgid "" "Note that this quick-start approach is not recommended for production " -"deployments on remote servers. Please read the rest of this document for" -" more information." +"deployments on remote servers. Please read the rest of this document for " +"more information." msgstr "" #: i2p2www/pages/downloads/docker.html:25 @@ -798,8 +617,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnark”) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnark”) " "downloads. See the example below." msgstr "" @@ -820,8 +639,8 @@ msgstr "puertos" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." msgstr "" #: i2p2www/pages/downloads/docker.html:38 @@ -914,11 +733,10 @@ msgstr "TCP and UDP" #: i2p2www/pages/downloads/docker.html:119 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." msgstr "" #: i2p2www/pages/downloads/docker.html:120 @@ -928,12 +746,11 @@ msgstr "Red" #: i2p2www/pages/downloads/docker.html:121 msgid "" "A best-practices guide for cloud deployments is beyond the scope of this " -"document, but in general you should try to minimize the number of " -"published ports, while exposing only the I2NP ports to the internet. " -"That means that the services in the list above which are bound to " -"127.0.0.1 (which include the router console) will need to be accessed via" -" other methods like ssh tunneling or be manually configured to bind to a " -"different interface." +"document, but in general you should try to minimize the number of published " +"ports, while exposing only the I2NP ports to the internet. That means that " +"the services in the list above which are bound to 127.0.0.1 (which include " +"the router console) will need to be accessed via other methods like ssh " +"tunneling or be manually configured to bind to a different interface." msgstr "" #: i2p2www/pages/downloads/docker.html:122 @@ -943,9 +760,9 @@ msgstr "de ejemplo" #: i2p2www/pages/downloads/docker.html:123 msgid "" "Here is an example container that mounts i2phome as home " -"directory, i2ptorrents for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." +"directory, i2ptorrents for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:6 @@ -956,17 +773,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit The " -"Firefox\n" +"comes bundled with this installer, visit The Firefox\n" "Profile Page." msgstr "" @@ -981,12 +793,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "Gitlab Issue. This is a Windows-only\n" "product." @@ -999,17 +808,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." msgstr "" @@ -1029,25 +833,18 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:65 @@ -1073,9 +870,7 @@ msgstr "" msgid "" "The files are signed by %(signer)s,\n" "whose key is here." -msgstr "" -"Los ficheros están firmados por %(signer)s,\n" -"cuya clave está aquí." +msgstr "Los ficheros están firmados por %(signer)s,\ncuya clave está aquí." #: i2p2www/pages/downloads/easyinstall.html:85 #: i2p2www/pages/downloads/firefox.html:70 @@ -1091,10 +886,8 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." msgstr "" @@ -1106,32 +899,25 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:101 -#: i2p2www/pages/downloads/firefox.html:86 i2p2www/pages/downloads/mac.html:105 +#: i2p2www/pages/downloads/firefox.html:86 +#: i2p2www/pages/downloads/mac.html:105 msgid "Source Code and Issue Tracking" msgstr "" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the i2p.firefox " -"project." +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the i2p.firefox project." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:107 @@ -1160,11 +946,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:111 #: i2p2www/pages/downloads/firefox.html:96 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." msgstr "" @@ -1176,50 +960,34 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:119 #: i2p2www/pages/downloads/firefox.html:104 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:126 #: i2p2www/pages/downloads/firefox.html:111 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." msgstr "" #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit The Easy Install Bundle Page." msgstr "" @@ -1229,30 +997,20 @@ msgstr "Perfiles del navegador I2P Firefox" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." msgstr "" #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" @@ -1285,8 +1043,7 @@ msgstr "" #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"I2P Lab\n" +"If you would like to try the latest experimental I2P projects, visit the I2P Lab\n" msgstr "" #: i2p2www/pages/downloads/list.html:19 i2p2www/pages/downloads/list.html:22 @@ -1312,9 +1069,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:39 #, python-format msgid "" -"The default I2P installer requires Java to be installed. You can obtain " -"it from Oracle or from your choice of Java " -"distribution. After installing Java, download the file and double-click\n" +"The default I2P installer requires Java to be installed. You can obtain it from Oracle or from your choice of Java distribution. After installing Java, download the file and double-click\n" " to run it." msgstr "" @@ -1324,10 +1079,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:43 msgid "" -"It is now possible to install all I2P components using a single package " -"(No Java required). To try out the new installer, click " -"below. This bundle can also be used to configure a Firefox Profile. It " -"will not interfere\n" +"It is now possible to install all I2P components using a single package (No Java required). To try out the new installer, click below. This bundle can also be used to configure a Firefox Profile. It will not interfere\n" " with an existing I2P installation if one exists." msgstr "" @@ -1341,8 +1093,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:50 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." msgstr "" #: i2p2www/pages/downloads/list.html:54 i2p2www/pages/downloads/list.html:56 @@ -1352,10 +1104,10 @@ msgstr "" #: i2p2www/pages/downloads/list.html:57 msgid "" -"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard" -" \".dmg\" package type, which allows it to use Apple's built-in tools to " -"securely, reliably, and easily install the package. It does not require " -"Java to be installed." +"The I2P Easy Install Bundle for Mac OS X is packaged using OSX's standard " +"\".dmg\" package type, which allows it to use Apple's built-in tools to " +"securely, reliably, and easily install the package. It does not require Java" +" to be installed." msgstr "" #: i2p2www/pages/downloads/list.html:64 @@ -1365,14 +1117,9 @@ msgstr "" #: i2p2www/pages/downloads/list.html:66 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" java -jar i2pinstall_%(i2pversion)s.jar. This will " -"launch the GUI installer. Depending on how your computer is set up, you " -"may be able to start the installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file\n" -" or right-clicking the file and selecting "Open with " -"Java". Unfortunately, this behaviour is difficult to predict." +"The most reliable way to launch the installer is from a terminal like this:\n" +" java -jar i2pinstall_%(i2pversion)s.jar. This will launch the GUI installer. Depending on how your computer is set up, you may be able to start the installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file\n" +" or right-clicking the file and selecting "Open with Java". Unfortunately, this behaviour is difficult to predict." msgstr "" #: i2p2www/pages/downloads/list.html:70 @@ -1382,11 +1129,8 @@ msgstr "Instalación desde línea de comandos (sistemas headless):" #: i2p2www/pages/downloads/list.html:71 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially useful for servers, containers, or certain virtual machines. " -"If you wish to use the installer without a GUI, you can use the command\n" -" java -jar i2pinstall_%(i2pversion)s.jar -console to " -"follow the install procedure in your terminal." +"I2P can also be installed in a terminal environment, which may be especially useful for servers, containers, or certain virtual machines. If you wish to use the installer without a GUI, you can use the command\n" +" java -jar i2pinstall_%(i2pversion)s.jar -console to follow the install procedure in your terminal." msgstr "" #: i2p2www/pages/downloads/list.html:74 @@ -1399,12 +1143,8 @@ msgstr "Hay paquetes disponibles para Debian y Ubuntu." #: i2p2www/pages/downloads/list.html:79 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid. However, Debian Buster and Ubuntu " -"Bionic (LTS) distributions will have older I2P versions. If you are not " -"running Debian Sid or the\n" -" latest Ubuntu release, use our Debian repo or Launchpad PPA to " -"ensure you're running the latest I2P version." +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid. However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions. If you are not running Debian Sid or the\n" +" latest Ubuntu release, use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/list.html:83 @@ -1414,9 +1154,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:86 msgid "" "Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed I2P, unfortunately this release fixes some IPC issues which " -"will force you to uninstall your current installation before installing " -"this." +"installed I2P, unfortunately this release fixes some IPC issues which will " +"force you to uninstall your current installation before installing this." msgstr "" #: i2p2www/pages/downloads/list.html:86 @@ -1425,9 +1164,7 @@ msgstr "512 MB de RAM mínimo, 1 GB recomendado" #: i2p2www/pages/downloads/list.html:87 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them completely before installing any other " -"version. The apk's from download.i2p2.de\n" +"The releases are not compatible with eachother, as they have different signatures. Uninstall them completely before installing any other version. The apk's from download.i2p2.de\n" " are signed by idk." msgstr "" @@ -1446,28 +1183,23 @@ msgid "docker pull geti2p/i2p" msgstr "" #: i2p2www/pages/downloads/list.html:110 -msgid "Additional instructions for configuring your container can be found here." +msgid "" +"Additional instructions for configuring your container can be found here." msgstr "" #: i2p2www/pages/downloads/list.html:113 #, python-format msgid "" "Alternately,\n" -" you can fetch the source via Git from git.repo.i2p or " -"Github.\n" -"
    Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or" -" headless install as above." +" you can fetch the source via Git from git.repo.i2p or Github.\n" +"
    Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg) then either run the GUI installer or headless install as above." msgstr "" #: i2p2www/pages/downloads/list.html:116 #, python-format msgid "" -"Android source is also in git on Github. Android\n" -" builds require the I2P source. See the documentation in the " -"Android source for additional build requirements and instructions." +"Android source is also in git on Github. Android\n" +" builds require the I2P source. See the documentation in the Android source for additional build requirements and instructions." msgstr "" #: i2p2www/pages/downloads/list.html:123 @@ -1480,8 +1212,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:124 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "whose key is here." msgstr "" @@ -1491,46 +1222,32 @@ msgstr "Actualizaciones desde versiones anteriores:" #: i2p2www/pages/downloads/list.html:129 msgid "Both automatic and manual upgrades are available for the release." -msgstr "" -"Hay disponibles actualizaciones de cambio de versión manuales y " -"automáticas." +msgstr "Hay disponibles actualizaciones de cambio de versión manuales y automáticas." #: i2p2www/pages/downloads/list.html:132 msgid "" "If you are running 0.7.5 or later, your router should detect the new " -"release. To upgrade simply click the 'Download Update' button on your " -"router console when it appears." +"release. To upgrade simply click the 'Download Update' button on your router" +" console when it appears." msgstr "" #: i2p2www/pages/downloads/list.html:134 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router since 0.9.9. Routers older than 0.9.9 will fail to " -"verify update files signed by str4d, and will need to be manually updated" -" using the process below." -msgstr "" -"Desde la 0.9.23, algunas versiones están firmadas por str4d, cuya clave " -"de firmado ha\n" -"estado en el router I2P desde la 0.9.9. Los routers I2P anteriores a la " -"0.9.9 no podrán\n" -"verificar los ficheros de actualización firmados por str4d, y precisarán " -"ser actualizados\n" -"manualmente usando el procedimiento a continuación." +"Since 0.9.23, some releases are signed by str4d, whose signing key has been " +"in the router since 0.9.9. Routers older than 0.9.9 will fail to verify " +"update files signed by str4d, and will need to be manually updated using the" +" process below." +msgstr "Desde la 0.9.23, algunas versiones están firmadas por str4d, cuya clave de firmado ha\nestado en el router I2P desde la 0.9.9. Los routers I2P anteriores a la 0.9.9 no podrán\nverificar los ficheros de actualización firmados por str4d, y precisarán ser actualizados\nmanualmente usando el procedimiento a continuación." #: i2p2www/pages/downloads/list.html:140 msgid "" -"Download the file to your I2P installation directory and rename as " -"i2pupdate.zip. (alternately, you can get the source as above and run " -"\"ant updater\", then copy the resulting i2pupdate.zip to your I2P " -"installation directory).\n" +"Download the file to your I2P installation directory and rename as i2pupdate.zip. (alternately, you can get the source as above and run \"ant updater\", then copy the resulting i2pupdate.zip to your I2P installation directory).\n" " You do NOT need to unzip the file." msgstr "" #: i2p2www/pages/downloads/list.html:144 msgid "Click \"Restart\"" -msgstr "" -"Pulse \"Reiniciar\"" +msgstr "Pulse \"Reiniciar\"" #: i2p2www/pages/downloads/list.html:147 msgid "Grab a cup of coffee and come back in 11 minutes" @@ -1541,9 +1258,7 @@ msgstr "Vaya a por una taza de horchata/café/cacao/mate y vuelva en 11 minutos. msgid "" "The file is signed by %(signer)s,\n" "whose key is here." -msgstr "" -"El fichero está firmado por %(signer)s,\n" -"cuya clave está aquí." +msgstr "El fichero está firmado por %(signer)s,\ncuya clave está aquí." #: i2p2www/pages/downloads/list.html:153 msgid "Previous Releases" @@ -1553,16 +1268,10 @@ msgstr "Versiones anteriores" #, python-format msgid "" "Previous releases are available on Google " -"Code and Launchpad " -"and within the I2P network on %(echelon)s." -msgstr "" -"Las versiones anteriores están disponibles en Google " -"Code y \n" -"Launchpad, y dentro de la" -" red I2P en %(echelon)s." +"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code " +"and Launchpad and within the" +" I2P network on %(echelon)s." +msgstr "Las versiones anteriores están disponibles en Google Code y \nLaunchpad, y dentro de la red I2P en %(echelon)s." #: i2p2www/pages/downloads/mac.html:6 msgid "Mac OS Easy Install Bundle" @@ -1570,53 +1279,38 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG-based bundle for Mac OS. It installs " -"and behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG-based bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" #: i2p2www/pages/downloads/mac.html:13 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:22 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on the browser configuration\n" "page." msgstr "" #: i2p2www/pages/downloads/mac.html:29 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" @@ -1626,10 +1320,8 @@ msgstr "Instrucciones" #: i2p2www/pages/downloads/mac.html:79 msgid "" -"Download the appropriate file for your Mac hardware and double-click on " -"it. Accept the License Agreement, then\n" -"drag the I2P icon on top of the Applications " -"icon.\n" +"Download the appropriate file for your Mac hardware and double-click on it. Accept the License Agreement, then\n" +"drag the I2P icon on top of the Applications icon.\n" "Launch I2P from Finder." msgstr "" @@ -1640,8 +1332,8 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:86 msgid "" "If you own an Apple silicon Mac and have previously installed the Intel " -"bundle on it you need to change the update configuration to make sure the" -" next I2P update does not revert your bundle to Intel." +"bundle on it you need to change the update configuration to make sure the " +"next I2P update does not revert your bundle to Intel." msgstr "" #: i2p2www/pages/downloads/mac.html:90 @@ -1658,18 +1350,14 @@ msgstr "Limitaciones" #: i2p2www/pages/downloads/mac.html:100 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:106 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1677,88 +1365,45 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the router console,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the router console,\n" "which has further instructions." -msgstr "" -"Después de ejecutar el instalador en Windows simplemente pulse en el " -"botón \n" -"\"Iniciar I2P\" que abrirá la consola del router I2P, \n" -"donde encontrará más instrucciones." +msgstr "Después de ejecutar el instalador en Windows simplemente pulse en el botón \n\"Iniciar I2P\" que abrirá la consola del router I2P, \ndonde encontrará más instrucciones." #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The router console\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The router console\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." -msgstr "" -"En sistemas tipo-Unix, I2P puede ser ejecutado como un servicio usando \n" -"el script \"i2prouter\" ubicado en el directorio seleccionado para I2P.\n" -"En un terminal, llendo a ese directorio y ejecutando \"sh i2prouter " -"status\" debería \n" -"mostrarle el estado del router I2P. Los argumentos \"start\", \"stop\" y " -"\"restart\" \n" -"controlan el servicio. A la consola del router se puede " -"acceder en su \n" -"ubicación habitual. Para usuarios de OpenSolaris y otros sistemas para " -"los que \n" -"no está soportado el wrapper (i2psvc, encapsulador como servicio para " -"Java), ejecute el router I2P con \"sh runplain.sh\" en lugar del " -"anterior." +msgstr "En sistemas tipo-Unix, I2P puede ser ejecutado como un servicio usando \nel script \"i2prouter\" ubicado en el directorio seleccionado para I2P.\nEn un terminal, llendo a ese directorio y ejecutando \"sh i2prouter status\" debería \nmostrarle el estado del router I2P. Los argumentos \"start\", \"stop\" y \"restart\" \ncontrolan el servicio. A la consola del router se puede acceder en su \nubicación habitual. Para usuarios de OpenSolaris y otros sistemas para los que \nno está soportado el wrapper (i2psvc, encapsulador como servicio para Java), ejecute el router I2P con \"sh runplain.sh\" en lugar del anterior." #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to adjust your " -"NAT/firewall\n" +"When installing for the first time, please remember to adjust your NAT/firewall\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "described here among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "configuration page." -msgstr "" -"Cuando instale I2P por primera vez, por favor recuerde ajustar su \n" -"NAT/cortafuegos sin olvidarse de los puertos que I2P usa para " -"Internet, \n" -"descritos aquí. Si ha abierto con éxito su " -"puerto TCP de entrada en su \n" -"NAT/cortafuegos, habilítelo también en la página de configuración." +msgstr "Cuando instale I2P por primera vez, por favor recuerde ajustar su \nNAT/cortafuegos sin olvidarse de los puertos que I2P usa para Internet, \ndescritos aquí. Si ha abierto con éxito su puerto TCP de entrada en su \nNAT/cortafuegos, habilítelo también en la página de configuración." #: i2p2www/pages/downloads/post-install.html:28 msgid "" "Also, please review and adjust the bandwidth settings on the\n" "configuration page,\n" "as the default settings of 96 KBps down / 40 KBps up are fairly slow." -msgstr "" -"Además, por favor revise y ajuste su configuración de ancho de " -"banda \n" -"en la página de " -"configuración, \n" -"ya que la configuración por defecto de 96 KBps de bajada / 40 KBps de " -"subida \n" -"es bastante lenta." +msgstr "Además, por favor revise y ajuste su configuración de ancho de banda \nen la página de configuración, \nya que la configuración por defecto de 96 KBps de bajada / 40 KBps de subida \nes bastante lenta." #: i2p2www/pages/downloads/redirect.html:2 msgid "Downloading..." @@ -1769,9 +1414,7 @@ msgstr "Descargando..." msgid "" "Your download will begin shortly. If it doesn't start within 5 seconds, " "click here." -msgstr "" -"Su descarga comenzará en breve. Si no comienza en 5 segundos, haga clic " -"aquí." +msgstr "Su descarga comenzará en breve. Si no comienza en 5 segundos, haga clic aquí." #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4 msgid "Mirror selection" @@ -1793,12 +1436,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -1808,12 +1448,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." msgstr "" #: i2p2www/pages/downloads/windows.html:18 @@ -1846,10 +1483,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" msgstr "" @@ -1859,15 +1494,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" msgstr "" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." msgstr "" @@ -1877,15 +1510,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." msgstr "" #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." msgstr "" @@ -1910,7 +1541,8 @@ msgid "https://geti2p.net" msgstr "" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "" #: i2p2www/pages/downloads/windows.html:83 @@ -1919,22 +1551,19 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." msgstr "" #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." msgstr "" #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." msgstr "" @@ -1944,8 +1573,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." msgstr "" #: i2p2www/pages/downloads/windows.html:109 @@ -1954,18 +1583,15 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." msgstr "" #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." msgstr "" @@ -1995,10 +1621,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." msgstr "" #: i2p2www/pages/downloads/windows.html:147 @@ -2011,8 +1635,7 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." msgstr "" @@ -2031,22 +1654,20 @@ msgid "Here we have an overview of the applications." msgstr "" #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." msgstr "" #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the router console homepage to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the router console homepage to\n" "get started." msgstr "" @@ -2056,11 +1677,9 @@ msgstr "No encontrado" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." -msgstr "" -"Lo que estaba buscando... se llama de otra forma, no existe o ha sido " -"borrado." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." +msgstr "Lo que estaba buscando... se llama de otra forma, no existe o ha sido borrado." #: i2p2www/pages/global/error_500.html:5 msgid "Server error" @@ -2124,9 +1743,7 @@ msgstr "El Proyecto de Internet Invisible" msgid "" "This page was last updated in %(lastupdated)s and is accurate for router " "version %(accuratefor)s." -msgstr "" -"Esta página fue actualizada por última vez el %(lastupdated)s y es " -"precisa con la versión %(accuratefor)s del router I2P." +msgstr "Esta página fue actualizada por última vez el %(lastupdated)s y es precisa con la versión %(accuratefor)s del router I2P." #: i2p2www/pages/global/layout.html:84 #, python-format @@ -2469,29 +2086,18 @@ msgstr "ATOM feed de las reuniones de I2P" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "the meetings forum." -msgstr "" -"Las reuniones del proyecto programadas regularmente se efectúan el primer" -" martes de cada mes a las 8 PM UTC.\n" -"Cualquiera puede programar y\n" -"convocar una reunión, publicando el orden del día en\n" -"el foro de reuniones." +msgstr "Las reuniones del proyecto programadas regularmente se efectúan el primer martes de cada mes a las 8 PM UTC.\nCualquiera puede programar y\nconvocar una reunión, publicando el orden del día en\nel foro de reuniones." #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"Status updates from developers are also " -"available." -msgstr "" -"Si tiene algo que discutir por favor busque a los desarrolladores en " -"#i2p-dev en el IRC. Las actualizaciones del " -"estado de los desarrolladores también están disponibles." +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"Status updates from developers are also available." +msgstr "Si tiene algo que discutir por favor busque a los desarrolladores en #i2p-dev en el IRC. Las actualizaciones del estado de los desarrolladores también están disponibles." #: i2p2www/pages/meetings/show.html:2 #, python-format @@ -2523,23 +2129,14 @@ msgid "" "BibTeX source page for examples.
    \n" "Remember to include URLs if possible:\n" "offline papers are less useful." -msgstr "" -"Por favor, envíe las entradas nuevas o corregidas a\n" -"%(email)s.
    \n" -"Si puede, use el formato BibTeX; vea our\n" -"BibTeX source page for examples.
    \n" -"Recuerde incluir las URLs si es posible:\n" -"offline papers are less useful." +msgstr "Por favor, envíe las entradas nuevas o corregidas a\n%(email)s.
    \nSi puede, use el formato BibTeX; vea our\nBibTeX source page for examples.
    \nRecuerde incluir las URLs si es posible:\noffline papers are less useful." #: i2p2www/pages/papers/list.html:80 #, python-format msgid "" "The source code for this page was adapted from\n" "Free Haven's anonymity bibliography." -msgstr "" -"El código fuente para esta página fue adaptado desde la \n" -"bibliografía de anonimato del proyecto Free " -"Haven." +msgstr "El código fuente para esta página fue adaptado desde la \nbibliografía de anonimato del proyecto Free Haven." #: i2p2www/pages/site/contact.html:4 msgid "Email" @@ -2549,11 +2146,7 @@ msgstr "Email" msgid "" "Please do not use these email addresses for support requests.\n" "For contact specific to research, outreach and security please use:" -msgstr "" -"No utilice estas direcciones de correo electrónico para solicitudes de " -"soporte.\n" -"Para contactos específicos de investigación, divulgación y seguridad, " -"utilice:" +msgstr "No utilice estas direcciones de correo electrónico para solicitudes de soporte.\nPara contactos específicos de investigación, divulgación y seguridad, utilice:" #: i2p2www/pages/site/contact.html:24 msgid "Please visit our I2P user forum -" @@ -2563,17 +2156,15 @@ msgstr "Visite nuestro foro de usuarios de I2P -" msgid "" "available on non-private internet at https://i2pforum.net and on I2P at " "http://i2pforum.i2p" -msgstr "" -"disponible en Internet no privada en https://i2pforum.net y en I2P en " -"http://i2pforum.i2p" +msgstr "disponible en Internet no privada en https://i2pforum.net y en I2P en http://i2pforum.i2p" #: i2p2www/pages/site/contact.html:26 #, python-format msgid "" "Most of the discussion about I2P's development happens on the I2P developer forum (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." +"href=\"http://%(zzz)s\">I2P developer forum (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." msgstr "" #: i2p2www/pages/site/contact.html:30 @@ -2583,42 +2174,19 @@ msgstr "Redes sociales" #: i2p2www/pages/site/contact.html:32 msgid "" "" -msgstr "" -"" +msgstr "" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like OFTC,\n" -" EIN and Freenode.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." -msgstr "" -"Nuestra red IRC principal es la red Irc2P dentro de I2P; tras la " -"instalación inicial de I2P ya hay creado por defecto un túnel a esta red." -" Estamos presentes también en múltiples redes como OFTC, EIN y Freenode. Todos los canales " -"relacionados con I2P en esas redes están unidos a los canales principales" -" de Irc2P a través de 'relay bots'." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like OFTC,\n" +" EIN and Freenode.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." +msgstr "Nuestra red IRC principal es la red Irc2P dentro de I2P; tras la instalación inicial de I2P ya hay creado por defecto un túnel a esta red. Estamos presentes también en múltiples redes como OFTC, EIN y Freenode. Todos los canales relacionados con I2P en esas redes están unidos a los canales principales de Irc2P a través de 'relay bots'." #: i2p2www/pages/site/contact.html:49 msgid "Channel list:" @@ -2642,9 +2210,7 @@ msgstr "Listas de correo" #: i2p2www/pages/site/contact.html:58 msgid "I2P has no active mailing lists, however archives can be accessed." -msgstr "" -"I2P no tiene listas de correo activas, pero se puede acceder a los " -"archivos." +msgstr "I2P no tiene listas de correo activas, pero se puede acceder a los archivos." #: i2p2www/pages/site/contact.html:62 msgid "Lists" @@ -2657,17 +2223,13 @@ msgstr "Archivo" #: i2p2www/pages/site/contact.html:67 msgid "I2P developer discussions - anything related to development of I2P" -msgstr "" -"Discusiones de desarrolladores de I2P - cualquier cosa relacionada con el" -" desarrollo de I2P" +msgstr "Discusiones de desarrolladores de I2P - cualquier cosa relacionada con el desarrollo de I2P" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" -msgstr "" -"Discusión general sobre I2P - cualquier cosa que no encaje en el resto de" -" las listas va aquí" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" +msgstr "Discusión general sobre I2P - cualquier cosa que no encaje en el resto de las listas va aquí" #: i2p2www/pages/site/contact.html:80 msgid "Team" @@ -2795,9 +2357,7 @@ msgstr "Administrador de CI" #: i2p2www/pages/site/contact.html:151 msgid "Maintain the Continuous Integration infrastructure" -msgstr "" -"Mantiene la infraestructura de integración continua (Continuous " -"Integration)" +msgstr "Mantiene la infraestructura de integración continua (Continuous Integration)" #: i2p2www/pages/site/contact.html:154 msgid "Reseed admin" @@ -2840,10 +2400,9 @@ msgid "Product Development" msgstr "Desarrollo del producto" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" -msgstr "" -"supervisa los proyectos desde las primeras etapas de planificación hasta " -"la finalización del proyecto" +msgid "" +"supervises projects from the early planning stages to project completion" +msgstr "supervisa los proyectos desde las primeras etapas de planificación hasta la finalización del proyecto" #: i2p2www/pages/site/contact.html:189 msgid "Website Maintainer" @@ -2893,9 +2452,7 @@ msgstr "Diseño y usabilidad" #: i2p2www/pages/site/contact.html:216 msgid "ongoing improvements to user experience for website and software" -msgstr "" -"mejoras continuas de la experiencia del usuario en el sitio web y los " -"programas informáticos" +msgstr "mejoras continuas de la experiencia del usuario en el sitio web y los programas informáticos" #: i2p2www/pages/site/contact.html:234 msgid "Director of passion" @@ -3015,9 +2572,7 @@ msgstr "Encargado de los paquetes para Debian/Ubuntu y del PPA" #: i2p2www/pages/site/contact.html:306 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web," -" y trabajos en los unit tests" +msgstr "Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web, y trabajos en los unit tests" #: i2p2www/pages/site/contact.html:311 msgid "Help needed on many fronts!" @@ -3097,10 +2652,9 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "desarrollo de jbigi, migración de la wiki, limpieza de la documentación" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" -msgstr "" -"depuración de java y desarrollo del cliente en I2PTunnel y en la consola " -"del ruter" +msgid "" +"java debugging and client development on I2PTunnel and the router console" +msgstr "depuración de java y desarrollo del cliente en I2PTunnel y en la consola del ruter" #: i2p2www/pages/site/contact.html:397 msgid "SAM perl module" @@ -3152,28 +2706,12 @@ msgstr "Inclusión" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.
    \n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.
    \n" "We disgrace hate, anger, racism, and bad speaking towards anyone.
    \n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.
    \n" -"We work together to build a free world without hate, racism and " -"violence.
    \n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." -msgstr "" -"I2P da la bienvenida a todo tipo de personas, siempre y cuando sean " -"amables y se ayuden mutuamente.
    \n" -"Rechazamos el odio, la ira, el racismo y las malas palabras hacia " -"cualquier persona.
    \n" -"Apoyamos a los LBGT, a las minorías oprimidas y a otras personas, tanto " -"si necesitan ayuda como si no.
    \n" -"Trabajamos juntos para construir un mundo libre sin odio, racismo ni " -"violencia.
    \n" -"El software del router I2P se creó con este espíritu y debe utilizarse " -"para ayudar a las personas reprimidas a recuperar su libertad de " -"expresión, sin reprimir a los demás." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.
    \n" +"We work together to build a free world without hate, racism and violence.
    \n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." +msgstr "I2P da la bienvenida a todo tipo de personas, siempre y cuando sean amables y se ayuden mutuamente.
    \nRechazamos el odio, la ira, el racismo y las malas palabras hacia cualquier persona.
    \nApoyamos a los LBGT, a las minorías oprimidas y a otras personas, tanto si necesitan ayuda como si no.
    \nTrabajamos juntos para construir un mundo libre sin odio, racismo ni violencia.
    \nEl software del router I2P se creó con este espíritu y debe utilizarse para ayudar a las personas reprimidas a recuperar su libertad de expresión, sin reprimir a los demás." #: i2p2www/pages/site/faq.html:2 msgid "Frequently Asked Questions" @@ -3193,11 +2731,8 @@ msgstr "¿Se requiere instalar Java para usar I2P?" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" -msgstr "" -"¿Qué es un \"Sitio I2P\" y cómo configuro mi navegador para poder " -"utilizarlos?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" +msgstr "¿Qué es un \"Sitio I2P\" y cómo configuro mi navegador para poder utilizarlos?" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 msgid "What do the Active x/y numbers mean in the router console?" @@ -3210,11 +2745,9 @@ msgstr "Mi router tiene muy pocos pares ('peers') activos, ¿está bien esto?" #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" -msgstr "" -"Estoy en contra de ciertos tipos de contenido. ¿Cómo evito almacenarlos, " -"distribuirlos o acceder a ellos?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" +msgstr "Estoy en contra de ciertos tipos de contenido. ¿Cómo evito almacenarlos, distribuirlos o acceder a ellos?" #: i2p2www/pages/site/faq.html:14 msgid "Is it possible to block I2P?" @@ -3224,11 +2757,7 @@ msgstr "¿Es posible bloquear I2P?" msgid "" "In wrapper.log I see an error stating Protocol family " "unavailable when I2P is loading" -msgstr "" -"En wrapper.log (registro del encasulador como servicio para " -"Java) veo un error indicando Protocol family unavailable " -"(familia de protocolos no disponible) ocurrido cuando I2P estaba " -"cargandose. " +msgstr "En wrapper.log (registro del encasulador como servicio para Java) veo un error indicando Protocol family unavailable (familia de protocolos no disponible) ocurrido cuando I2P estaba cargandose. " #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189 msgid "Most of the I2P Sites within I2P are down?" @@ -3254,9 +2783,7 @@ msgstr "¿Cómo puedo crear mi propio sitio I2P?" msgid "" "If I host a website at I2P at home, containing only HTML and CSS, is it " "dangerous?" -msgstr "" -"Si alojo un sitio web en I2P en casa, que sólo contenga HTML y CSS, ¿es " -"peligroso?" +msgstr "Si alojo un sitio web en I2P en casa, que sólo contenga HTML y CSS, ¿es peligroso?" #: i2p2www/pages/site/faq.html:25 msgid "How Does I2P find \".i2p\" websites?" @@ -3274,17 +2801,13 @@ msgstr "¿Qué puertos usa I2P?" msgid "" "I'm missing lots of hosts in my address book. What are some good " "subscription links?" -msgstr "" -"Me faltan muchos anfitriones en mi libreta de direcciones. ¿Cuáles son " -"algunos buenos enlaces de suscripción?" +msgstr "Me faltan muchos anfitriones en mi libreta de direcciones. ¿Cuáles son algunos buenos enlaces de suscripción?" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" -msgstr "" -"¿Cómo puedo acceder a la consola web desde máquinas remotas y cómo la " -"protejo con contraseña?" +"How can I access the web console from my other machines or password protect " +"it?" +msgstr "¿Cómo puedo acceder a la consola web desde máquinas remotas y cómo la protejo con contraseña?" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 msgid "How can I use applications from my other machines?" @@ -3296,8 +2819,7 @@ msgstr "¿Es posible usar I2P como un proxy SOCKS?" #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" msgstr "¿Cómo accedo al IRC, Bittorrent u otros servicios en la Internet regular?" #: i2p2www/pages/site/faq.html:34 @@ -3308,9 +2830,7 @@ msgstr "" msgid "" "My router has been up for several minutes and has zero or very few " "connections" -msgstr "" -"Mi router ha estado activo durante varios minutos y aún tiene ninguna o " -"muy pocas conexiones" +msgstr "Mi router ha estado activo durante varios minutos y aún tiene ninguna o muy pocas conexiones" #: i2p2www/pages/site/faq.html:37 i2p2www/pages/site/faq.html:763 msgid "How do I reseed manually?" @@ -3324,9 +2844,7 @@ msgstr "Privacidad-Seguridad" msgid "" "Is my router an \"exit node\"(outproxy) to the regular Internet? I don't " "want it to be." -msgstr "" -"¿Es mi router un \"nodo de salida\" (outproxy) hacia la Internet regular?" -" No quiero que lo sea." +msgstr "¿Es mi router un \"nodo de salida\" (outproxy) hacia la Internet regular? No quiero que lo sea." #: i2p2www/pages/site/faq.html:42 i2p2www/pages/site/faq.html:695 msgid "Is it easy to detect the use of I2P by analyzing network traffic?" @@ -3338,11 +2856,9 @@ msgstr "¿Es seguro utilizar I2P?" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"Veo las direcciones IP de todos los demás nodos I2P en la consola del " -"router. ¿Significa eso que mi dirección IP es visible por los demás?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "Veo las direcciones IP de todos los demás nodos I2P en la consola del router. ¿Significa eso que mi dirección IP es visible por los demás?" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 msgid "Is using an outproxy safe?" @@ -3368,18 +2884,13 @@ msgstr "¿Por qué mi router utiliza demasiada CPU?" msgid "" "My active peers / known peers / participating tunnels / connections / " "bandwidth vary dramatically over time! Is anything wrong?" -msgstr "" -"¡Mis pares activos / pares conocidos / túneles participantes / conexiones" -" / ancho de banda, varían dramáticamente a lo largo del tiempo! ¿Está mal" -" algo?" +msgstr "¡Mis pares activos / pares conocidos / túneles participantes / conexiones / ancho de banda, varían dramáticamente a lo largo del tiempo! ¿Está mal algo?" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" -msgstr "" -"¿Qué hace que las descargas, los torrents, la navegación web y todo lo " -"demás sea más lento en I2P en comparación con Internet normal?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" +msgstr "¿Qué hace que las descargas, los torrents, la navegación web y todo lo demás sea más lento en I2P en comparación con Internet normal?" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 msgid "I think I found a bug, where can I report it?" @@ -3392,41 +2903,31 @@ msgstr "¡Tengo una pregunta!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the Java programming language." -" \n" +"I2P is written in the Java programming language. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An Android port is also available." msgstr "" #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." msgstr "" #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the Raspberry Pi range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the Raspberry Pi range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." msgstr "" #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "%(chart)s.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." @@ -3435,13 +2936,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "alternative clients which don't require Java." -msgstr "" -"Aunque la principal implementación de cliente I2P requiere Java, hay\n" -"varios clientes alternativos que no requieren " -"Java." +msgstr "Aunque la principal implementación de cliente I2P requiere Java, hay\nvarios clientes alternativos que no requieren Java." #: i2p2www/pages/site/faq.html:101 msgid "What is an \"I2P Site?\"" @@ -3450,36 +2947,22 @@ msgstr "" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the browser configuration page." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the browser configuration page." msgstr "" #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." msgstr "" #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" msgstr "" @@ -3487,93 +2970,54 @@ msgstr "" #: i2p2www/pages/site/faq.html:129 msgid "" "Distribution
    \n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route any traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an exit node (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route any traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." msgstr "" #: i2p2www/pages/site/faq.html:139 msgid "" "Storage
    \n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, Freenet.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, Freenet.\n" "By running I2P, you are not storing content for anyone." msgstr "" #: i2p2www/pages/site/faq.html:147 msgid "" "Access
    \n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." -msgstr "" -"Acceso
    \n" -"Si hay servicios ocultos que no le gustan, puede abstenerse de " -"visitarlos.\n" -"Su router no solicitará ningún contenido sin que usted se lo indique " -"expresamente." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." +msgstr "Acceso
    \nSi hay servicios ocultos que no le gustan, puede abstenerse de visitarlos.\nSu router no solicitará ningún contenido sin que usted se lo indique expresamente." #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." -msgstr "" -"Sí, con mucho, la forma más fácil y más común es mediante el bloqueo de " -"bootstrap, o \"Reseed\" de servidores. Bloquear completamente todo el " -"tráfico ofuscado\n" -"también funcionaría (aunque rompería muchas, muchas otras cosas que no " -"son I2P y la mayoría no están dispuestos a ir tan lejos).\n" -"En el caso del bloqueo de reseed, hay un paquete de reseed en Github, " -"bloquearlo también bloqueará Github.\n" -"Puedes hacer reseed a través de un proxy (se pueden encontrar muchos en " -"Internet si no quieres usar Tor) o compartir paquetes de reseed de amigo " -"a amigo sin conexión." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." +msgstr "Sí, con mucho, la forma más fácil y más común es mediante el bloqueo de bootstrap, o \"Reseed\" de servidores. Bloquear completamente todo el tráfico ofuscado\ntambién funcionaría (aunque rompería muchas, muchas otras cosas que no son I2P y la mayoría no están dispuestos a ir tan lejos).\nEn el caso del bloqueo de reseed, hay un paquete de reseed en Github, bloquearlo también bloqueará Github.\nPuedes hacer reseed a través de un proxy (se pueden encontrar muchos en Internet si no quieres usar Tor) o compartir paquetes de reseed de amigo a amigo sin conexión." #: i2p2www/pages/site/faq.html:161 msgid "" "In wrapper.log I see an error that states \"Protocol " "family unavailable\" when loading the Router Console" -msgstr "" -"En el archivo wrapper.log veo un error que indica " -"\"Protocol family unavailable\" cuando arranco la consola " -"del ruter." +msgstr "En el archivo wrapper.log veo un error que indica \"Protocol family unavailable\" cuando arranco la consola del ruter." #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" -msgstr "" -"A menudo este error ocurre con cualquier aplicación java que active la " -"red en sistemas configurados para usar IPV6 por defecto. Hay varias " -"formas de arreglarlo:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" +msgstr "A menudo este error ocurre con cualquier aplicación java que active la red en sistemas configurados para usar IPV6 por defecto. Hay varias formas de arreglarlo:" #: i2p2www/pages/site/faq.html:168 msgid "" "On Linux based systems, you can echo 0 > " "/proc/sys/net/ipv6/bindv6only" -msgstr "" -"En sistemas basados en Linux puede ejecutar echo 0 > " -"/proc/sys/net/ipv6/bindv6only" +msgstr "En sistemas basados en Linux puede ejecutar echo 0 > /proc/sys/net/ipv6/bindv6only" #: i2p2www/pages/site/faq.html:170 msgid "Look for the following lines in wrapper.config." @@ -3581,42 +3025,30 @@ msgstr "Busque por las siguientes líneas en wrapper.config." #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." -msgstr "" -"Si las líneas ya están ahí, descomentelas eliminando los \"#\". Si las " -"líneas no están ahí añádalas sin los \"#\"." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." +msgstr "Si las líneas ya están ahí, descomentelas eliminando los \"#\". Si las líneas no están ahí añádalas sin los \"#\"." #: i2p2www/pages/site/faq.html:177 msgid "" "Another option would be to remove the ::1 from " "~/.i2p/clients.config" -msgstr "" -"Otra opción sería borrar ::1 del archivo " -"~/.i2p/clients.config" +msgstr "Otra opción sería borrar ::1 del archivo ~/.i2p/clients.config" #: i2p2www/pages/site/faq.html:181 msgid "" -"WARNING: For any changes to wrapper.config " -"to take effect, you must completely\n" +"WARNING: For any changes to wrapper.config to take effect, you must completely\n" "stop the router and the wrapper. Clicking Restart on your\n" "router console will NOT reread this file! You must\n" "click Shutdown, wait 11 minutes, then start I2P." -msgstr "" -"CUIDADO: Para que los cambios en " -"wrapper.config tengan efecto debe apagar completamente el " -"ruter y el wrapper. ¡Pulsando Reiniciar en la consola del ruter " -"NO leerá de nuevo este archivo! Tiene que pulsar apagar, " -"esperar 11 minutos y entonces arrancar I2P." +msgstr "CUIDADO: Para que los cambios en wrapper.config tengan efecto debe apagar completamente el ruter y el wrapper. ¡Pulsando Reiniciar en la consola del ruter NO leerá de nuevo este archivo! Tiene que pulsar apagar, esperar 11 minutos y entonces arrancar I2P." #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "%(eepstatus)s tracks active I2P Sites." msgstr "" @@ -3626,94 +3058,49 @@ msgstr "¿Porqué está escuchando I2P en el puerto 32000?" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." -msgstr "" -"El Tanuki java service wrapper que utilizamos abre este puerto " -"—vinculado a localhost— con el fin de comunicarse con el " -"software que se ejecuta dentro de la JVM. \n" -"Cuando se lanza la JVM se le da una clave para que pueda conectarse a la " -"envoltura. \n" -"Después de que la JVM establece su conexión con la envoltura, ésta " -"rechaza cualquier conexión adicional." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." +msgstr "El Tanuki java service wrapper que utilizamos abre este puerto —vinculado a localhost— con el fin de comunicarse con el software que se ejecuta dentro de la JVM. \nCuando se lanza la JVM se le da una clave para que pueda conectarse a la envoltura. \nDespués de que la JVM establece su conexión con la envoltura, ésta rechaza cualquier conexión adicional." #: i2p2www/pages/site/faq.html:206 msgid "" "More information can be found in the wrapper documentation." -msgstr "" -"Encontrará más información en la documentación sobre envoltorios." +msgstr "Encontrará más información en la documentación sobre envoltorios." #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a separate page with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." +"The proxy config for different browsers is on a separate page with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." msgstr "" #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the I2PTunnel " -"configuration page), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to localhost " -"6668. \n" -"HexChat-like client users can create a new network with the server " -"localhost/6668 (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the I2PTunnel configuration page), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to localhost 6668. \n" +"HexChat-like client users can create a new network with the server localhost/6668 (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" msgstr "" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the Website link at the " -"top of your router console for instructions." -msgstr "" -"Pulse en el enlace a la página web" -" en la parte de arriba de las instrucciones de la consola del ruter." +"Click on the Website link at the top " +"of your router console for instructions." +msgstr "Pulse en el enlace a la página web en la parte de arriba de las instrucciones de la consola del ruter." #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." -msgstr "" -"Si alojas un blog personal o haces algo que no sea sensible, obviamente " -"corres poco peligro.\n" -"Si tienes necesidades de privacidad que básicamente no son específicas, " -"corres poco peligro. Si estás alojando algo sensible, entonces\n" -"tus servicios se caerán al mismo tiempo que tu router. Alguien que " -"observe su tiempo de inactividad y lo correlacione con\n" -"eventos del mundo real probablemente podría desanonimizarte con " -"suficiente esfuerzo. I2P tiene defensas disponibles contra esto como " -"multihoming o\n" -"Tahoe-LAFS, pero requieren una configuración adicional y sólo son " -"apropiadas para algunos modelos de amenaza. No existe una solución " -"mágica.\n" -"protegerse de una amenaza real requerirá una consideración real en " -"cualquier caso." +msgstr "Si alojas un blog personal o haces algo que no sea sensible, obviamente corres poco peligro.\nSi tienes necesidades de privacidad que básicamente no son específicas, corres poco peligro. Si estás alojando algo sensible, entonces\ntus servicios se caerán al mismo tiempo que tu router. Alguien que observe su tiempo de inactividad y lo correlacione con\neventos del mundo real probablemente podría desanonimizarte con suficiente esfuerzo. I2P tiene defensas disponibles contra esto como multihoming o\nTahoe-LAFS, pero requieren una configuración adicional y sólo son apropiadas para algunos modelos de amenaza. No existe una solución mágica.\nprotegerse de una amenaza real requerirá una consideración real en cualquier caso." #: i2p2www/pages/site/faq.html:250 msgid "How Does I2P find \".i2p\" websites? " @@ -3725,38 +3112,24 @@ msgstr "¿Cómo añado direcciones a la Agenda? " #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." -msgstr "" -"No puede añadir una dirección sin conocer al menos el base32 o el base64 " -"del sitio que desea visitar. El \"nombre de host\" que es legible por " -"humanos es sólo un alias para la dirección criptográfica, que corresponde" -" a base32 o base64. Sin la dirección criptográfica, no hay manera de " -"acceder a un sitio I2P, esto es por diseño. Distribuir la dirección a las" -" personas que aún no la conocen suele ser responsabilidad del proveedor " -"del servicio Jump. Visitar un Sitio I2P que es desconocido activará el " -"uso de un servicio Jump. stats.i2p es el servicio Jump más fiable." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." +msgstr "No puede añadir una dirección sin conocer al menos el base32 o el base64 del sitio que desea visitar. El \"nombre de host\" que es legible por humanos es sólo un alias para la dirección criptográfica, que corresponde a base32 o base64. Sin la dirección criptográfica, no hay manera de acceder a un sitio I2P, esto es por diseño. Distribuir la dirección a las personas que aún no la conocen suele ser responsabilidad del proveedor del servicio Jump. Visitar un Sitio I2P que es desconocido activará el uso de un servicio Jump. stats.i2p es el servicio Jump más fiable." #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." -msgstr "" -"Si estás alojando un sitio a través de i2ptunnel, entonces todavía no " -"tendrá un registro con un servicio de salto. Para darle una URL " -"localmente, entonces visita la página de configuración y haz clic en el " -"botón que dice \"Añadir a la libreta de direcciones local\". A " -"continuación, vaya a http://127.0.0.1:7657/dns para buscar la URL de " -"addresshelper y compártala." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." +msgstr "Si estás alojando un sitio a través de i2ptunnel, entonces todavía no tendrá un registro con un servicio de salto. Para darle una URL localmente, entonces visita la página de configuración y haz clic en el botón que dice \"Añadir a la libreta de direcciones local\". A continuación, vaya a http://127.0.0.1:7657/dns para buscar la URL de addresshelper y compártala." #: i2p2www/pages/site/faq.html:261 msgid "The ports that are used by I2P can be divided into 2 sections:" @@ -3766,9 +3139,7 @@ msgstr "Los puertos que utiliza I2P pueden dividirse en 2 secciones:" msgid "" "Internet-facing ports, which are used for communication with other I2P " "routers" -msgstr "" -"Puertos orientados a Internet, que se utilizan para la comunicación con " -"otros routers I2P" +msgstr "Puertos orientados a Internet, que se utilizan para la comunicación con otros routers I2P" #: i2p2www/pages/site/faq.html:267 msgid "Local ports, for local connections" @@ -3780,12 +3151,9 @@ msgstr "A continuación se describen detalladamente." #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports
    Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router configuration page." +"Internet-facing ports
    Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router configuration page." msgstr "" #: i2p2www/pages/site/faq.html:278 @@ -3795,8 +3163,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the configuration page to " -"arbitrary remote UDP ports, allowing for replies" +"href=\"http://127.0.0.1:7657/confignet\">configuration page to arbitrary" +" remote UDP ports, allowing for replies" msgstr "" #: i2p2www/pages/site/faq.html:281 @@ -3806,9 +3174,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" msgstr "" #: i2p2www/pages/site/faq.html:285 @@ -3861,153 +3227,102 @@ msgstr "" #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on configclients. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on configclients. \n" " May be changed in the bob.config file." msgstr "" #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.HTTPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.HTTPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"i2np.upnp.SSDPPort=nnnn. \n" -" May be disabled on confignet." +" May be changed with advanced config i2np.upnp.SSDPPort=nnnn. \n" +" May be disabled on confignet." msgstr "" #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on configclients but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on configclients." +" May be changed to a different port on configclients but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on configclients." msgstr "" #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on configclients. \n" -" May be changed in the clients.config file with the" -" SAM command line option sam.udp.port=nnnn." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on configclients. \n" +" May be changed in the clients.config file with the SAM command line option sam.udp.port=nnnn." msgstr "" #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on configclients. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on configclients. \n" " May be changed in the clients.config file." msgstr "" #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the clients.configfile. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." +" May also be configured to be bound to a specific interface or all interfaces in that file." msgstr "" #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the clients.config file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the jetty.xml file." +" May also be configured to be bound to a specific interface or all interfaces in the jetty.xml file." msgstr "" #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." -msgstr "" -"Puede desactivarse o modificarse en la página i2ptunnel de la consola del" -" router. \n" -" También puede configurarse para que esté vinculado a una " -"interfaz específica o a todas las interfaces." +" May also be configured to be bound to a specific interface or all interfaces." +msgstr "Puede desactivarse o modificarse en la página i2ptunnel de la consola del router. \n También puede configurarse para que esté vinculado a una interfaz específica o a todas las interfaces." #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the wrapper documentation. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the wrapper documentation. \n" +"To change, see the wrapper documentation. \n" " For more information see below." msgstr "" #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." -msgstr "" -"Los puertos locales de I2P y los puertos de I2PTunnel no necesitan ser " -"accesibles desde máquinas remotas, pero *deberían* ser accesibles " -"localmente. Además puede crear también puertos adicionales para " -"instancias I2PTunnel vía http://localhost:7657/i2ptunnel/ (y a su vez, " -"necesitará permitir en su cortafuegos el acceso local, pero no remoto, a " -"no ser que lo desee así)." +msgstr "Los puertos locales de I2P y los puertos de I2PTunnel no necesitan ser accesibles desde máquinas remotas, pero *deberían* ser accesibles localmente. Además puede crear también puertos adicionales para instancias I2PTunnel vía http://localhost:7657/i2ptunnel/ (y a su vez, necesitará permitir en su cortafuegos el acceso local, pero no remoto, a no ser que lo desee así)." #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"outbound facing port, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the outbound facing port, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." -msgstr "" -"Resumiendo, nada necesita ser accesible por pares remotos que no hayan " -"sido solicitados, pero, si puede configurar su NAT/cortafuegos para " -"permitir conexiones de entrada UDP y TCP hacia los puertos de escucha de salida, " -"tendrá mejor rendimiento. También necesitará ser capaz de enviar paquetes" -" UDP de salida a pares remotos arbitrarios ( bloqueando IPs " -"aleatoriamente con cosas como PeerGuardian solo le perjudica a usted - no" -" lo haga)." +msgstr "Resumiendo, nada necesita ser accesible por pares remotos que no hayan sido solicitados, pero, si puede configurar su NAT/cortafuegos para permitir conexiones de entrada UDP y TCP hacia los puertos de escucha de salida, tendrá mejor rendimiento. También necesitará ser capaz de enviar paquetes UDP de salida a pares remotos arbitrarios ( bloqueando IPs aleatoriamente con cosas como PeerGuardian solo le perjudica a usted - no lo haga)." #: i2p2www/pages/site/faq.html:534 msgid "This question can be answered in 3 parts:" @@ -4017,28 +3332,20 @@ msgstr "Esta pregunta puede responderse en 3 partes:" msgid "" "My router often displays a message saying \"Website Not Found In Address " "Book\", why do I see this message?" -msgstr "" -"Mi router muestra a menudo un mensaje que dice \"Website Not Found In " -"Address Book\", ¿por qué veo este mensaje?" +msgstr "Mi router muestra a menudo un mensaje que dice \"Website Not Found In Address Book\", ¿por qué veo este mensaje?" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as http://website.i2p are references" -" to a long, random string known as a destination. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a SHA256 hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." +"Human-readable addresses such as http://website.i2p are references to a long, random string known as a destination. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a SHA256 hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." msgstr "" #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." msgstr "" #: i2p2www/pages/site/faq.html:545 @@ -4047,8 +3354,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." msgstr "" #: i2p2www/pages/site/faq.html:547 @@ -4068,8 +3375,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" msgstr "" @@ -4090,17 +3396,14 @@ msgstr "" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example https://github.com/PowerShell/Win32-OpenSSH)" msgstr "" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" msgstr "" #: i2p2www/pages/site/faq.html:593 @@ -4109,118 +3412,84 @@ msgstr "" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to http://localhost:7657/configui" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." +"Go to http://localhost:7657/configui and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." msgstr "" #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to http://localhost:7657/index and " -"hit \"Graceful restart\", \n" +"Go to http://localhost:7657/index and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" msgstr "" #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at http://(System_IP):7657 and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at http://(System_IP):7657 and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." msgstr "" #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." msgstr "" #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"http://localhost:7657/configi2cp" +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"http://localhost:7657/configi2cp" msgstr "" #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." msgstr "" #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." msgstr "" #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the socks page." -msgstr "" -"Si aún así desea mas información sobre el proxy socks, hay algunas " -"sugerencias útiles en la web de socks" +msgstr "Si aún así desea mas información sobre el proxy socks, hay algunas sugerencias útiles en la web de socks" #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" +"Please be aware that the Tor project recommends against using BitTorrent over Tor, \n" "as there are serious anonymity-related issues associated with doing so." msgstr "" #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." -msgstr "" -"¿Es mi router un \"nodo de salida\" a la Internet regular? No quiero que " -"lo sea." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." +msgstr "¿Es mi router un \"nodo de salida\" a la Internet regular? No quiero que lo sea." #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike Tor, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike Tor, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an outproxy guide available on our " -"forums, if you would like to learn more about running an outproxy." +"There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy." msgstr "" #: i2p2www/pages/site/faq.html:679 @@ -4230,185 +3499,128 @@ msgstr "" #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" msgstr "" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." msgstr "" #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." msgstr "" #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through Transport" -" Layer Security (TLS). \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." msgstr "" #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" +"For more information, you may read the Tor FAQ's answer to this question:\n" +"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop" msgstr "" #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on %(zzz)s.\n" -"This discussion has been mirrored on our " -"forums as well." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on %(zzz)s.\n" +"This discussion has been mirrored on our forums as well." msgstr "" #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your threat model, and how much you " -"choose to trust the outproxy operator." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your threat model, and how much you choose to trust the outproxy operator." msgstr "" #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." msgstr "" #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." msgstr "" #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." msgstr "" #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the reseed instructions." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the reseed instructions." msgstr "" #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." msgstr "" #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." -msgstr "" -"Un síntoma típico de un resembrado fallido es el indicador \"Conocidos\" " -"(a la\n" -"izquierda de la barra lateral de la consola del router I2P) mostrando un " -"valor\n" -"muy pequeño (a menudo menor que 5) que no se incrementa. Esto puede\n" -"ocurrir, entre otras cosas, si su cortafuegos (firewall) local limita el " -"tráfico\n" -"saliente o si la petición de resembrado está bloqueada por completo." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." +msgstr "Un síntoma típico de un resembrado fallido es el indicador \"Conocidos\" (a la\nizquierda de la barra lateral de la consola del router I2P) mostrando un valor\nmuy pequeño (a menudo menor que 5) que no se incrementa. Esto puede\nocurrir, entre otras cosas, si su cortafuegos (firewall) local limita el tráfico\nsaliente o si la petición de resembrado está bloqueada por completo." #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." -msgstr "" -"Si está atrapado detrás de un cortafuegos o filtro de su proveedor de\n" -"Internet (ISP), puede usar el siguiente método manual (solución técnica\n" -"no-automatizada) para unirse a la red I2P." +msgstr "Si está atrapado detrás de un cortafuegos o filtro de su proveedor de\nInternet (ISP), puede usar el siguiente método manual (solución técnica\nno-automatizada) para unirse a la red I2P." #: i2p2www/pages/site/faq.html:784 #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to %(url)s and configure the proxy type, " -"hostname, and port." -msgstr "" -"\n" -"Desde la versión 0.9.33, también puede configurar su router I2P para " -"resembrar a través de proxy.\n" -"Vaya a %(url)s y configure el tipo de proxy, " -"nombre de servidor, y puerto." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to %(url)s and configure the proxy type, hostname, and port." +msgstr "\nDesde la versión 0.9.33, también puede configurar su router I2P para resembrar a través de proxy.\nVaya a %(url)s y configure el tipo de proxy, nombre de servidor, y puerto." #: i2p2www/pages/site/faq.html:789 msgid "Joining the I2P Network using a reseed file" @@ -4416,34 +3628,14 @@ msgstr "Unirse a la red I2P usando un fichero de resembrado" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." -msgstr "" -"Por favor, contacte con un amigo de conocida confianza que tenga un " -"router I2P\n" -"en ejecución, y pídale ayuda con el resembrado de su router I2P. Pídale " -"que le\n" -"envíe un fichero de resembrado exportado desde su router I2P en " -"ejecución. Es\n" -"vital que el fichero sea intercambiado a través de un canal seguro, ej. " -"cifrado para\n" -"evitar alteraciones externas (firma PGP, cifrado y verificado con una " -"clave pública\n" -"de confianza). El propio fichero no está firmado, así que, por favor, " -"sólo acepte\n" -"ficheros de amigos de conocida confianza. Nunca importe un fichero de\n" -"resembrado si no puede verificar su procedencia." +msgstr "Por favor, contacte con un amigo de conocida confianza que tenga un router I2P\nen ejecución, y pídale ayuda con el resembrado de su router I2P. Pídale que le\nenvíe un fichero de resembrado exportado desde su router I2P en ejecución. Es\nvital que el fichero sea intercambiado a través de un canal seguro, ej. cifrado para\nevitar alteraciones externas (firma PGP, cifrado y verificado con una clave pública\nde confianza). El propio fichero no está firmado, así que, por favor, sólo acepte\nficheros de amigos de conocida confianza. Nunca importe un fichero de\nresembrado si no puede verificar su procedencia." #: i2p2www/pages/site/faq.html:800 #, python-format @@ -4471,9 +3663,7 @@ msgstr "Pulse \"Resembrar desde fichero\"" #: i2p2www/pages/site/faq.html:807 #, python-format msgid "Check the log for the following message:" -msgstr "" -"Compruebe el registro (log) para el siguiente " -"mensaje:" +msgstr "Compruebe el registro (log) para el siguiente mensaje:" #: i2p2www/pages/site/faq.html:811 msgid "Sharing a reseed file" @@ -4481,11 +3671,9 @@ msgstr "Compartir un fichero de resembrado" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" -msgstr "" -"Para amigos de confianza puede usar su router I2P local para brindarles " -"un arranque asistido:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" +msgstr "Para amigos de confianza puede usar su router I2P local para brindarles un arranque asistido:" #: i2p2www/pages/site/faq.html:815 msgid "Under \"Create Reseed File\" click \"Create reseed file\"" @@ -4499,21 +3687,11 @@ msgstr "Enviar de forma segura el fichero %(filename)s a un amigo" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." -msgstr "" -"¡No revele este fichero a usuarios desconocidos en ningún caso, ya que " -"contiene\n" -"datos privados sensibles (100 RouterInfo) de su propio router I2P! Para " -"proteger\n" -"su anonimato: puede esperar unas pocas horas/días antes de compartir el\n" -"fichero con su amigo de confianza. También es aconsejable usar este\n" -"procedimiento con moderación (< 2 veces por semana)." +msgstr "¡No revele este fichero a usuarios desconocidos en ningún caso, ya que contiene\ndatos privados sensibles (100 RouterInfo) de su propio router I2P! Para proteger\nsu anonimato: puede esperar unas pocas horas/días antes de compartir el\nfichero con su amigo de confianza. También es aconsejable usar este\nprocedimiento con moderación (< 2 veces por semana)." #: i2p2www/pages/site/faq.html:826 msgid " General guidelines for manual reseeding of I2P " @@ -4521,17 +3699,14 @@ msgstr "Directrices generales para el resembrado manual de I2P" #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" -msgstr "" -"¡No publique abiertamente el fichero de resembrado (clearnet) ni comparta" -" estos ficheros con un amigo de un amigo (darknet)!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" +msgstr "¡No publique abiertamente el fichero de resembrado (clearnet) ni comparta estos ficheros con un amigo de un amigo (darknet)!" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" -msgstr "" -"¡Este fichero sólo se debe usar para un número muy limitado de amigos " -"(<3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" +msgstr "¡Este fichero sólo se debe usar para un número muy limitado de amigos (<3)!" #: i2p2www/pages/site/faq.html:830 msgid "The file is valid only a few days (< 20)!" @@ -4539,90 +3714,42 @@ msgstr "¡El fichero sólo es válido unos pocos días (< 20)!" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using Tor." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using Tor." msgstr "" #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." -msgstr "" -"Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" -"\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." +msgstr "Within I2P, there is no requirement to use HTTPS. \n All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n\n However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n Any hidden service operator would have to specifically set up and enable HTTPS access." #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." -msgstr "" -"El FTP no es compatible por razones técnicas.\n" -"\n" -" No existen \"outproxies\" FTP a Internet, ni siquiera es posible " -"instalarlos. \n" -" Cualquier otro tipo de outproxy puede funcionar si se configura con " -"un túnel estándar. \n" -" Si desea configurar algún tipo de outproxy, investigue cuidadosamente" -" los riesgos potenciales. \n" -" La comunidad I2P puede o no ayudarle con los aspectos técnicos, no " -"dude en preguntar.\n" -"\n" -" Como ya se ha explicado en varias ocasiones, cualquier outproxy " -"existente no es una parte central de la red. \n" -" Son servicios gestionados por particulares y pueden estar operativos " -"o no en un momento dado." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." +msgstr "El FTP no es compatible por razones técnicas.\n\n No existen \"outproxies\" FTP a Internet, ni siquiera es posible instalarlos. \n Cualquier otro tipo de outproxy puede funcionar si se configura con un túnel estándar. \n Si desea configurar algún tipo de outproxy, investigue cuidadosamente los riesgos potenciales. \n La comunidad I2P puede o no ayudarle con los aspectos técnicos, no dude en preguntar.\n\n Como ya se ha explicado en varias ocasiones, cualquier outproxy existente no es una parte central de la red. \n Son servicios gestionados por particulares y pueden estar operativos o no en un momento dado." #: i2p2www/pages/site/faq.html:876 msgid "My router is using a large amount of CPU, what can I do about this?" -msgstr "" -"Mi router está utilizando una gran cantidad de CPU, ¿qué puedo hacer al " -"respecto?" +msgstr "Mi router está utilizando una gran cantidad de CPU, ¿qué puedo hacer al respecto?" #: i2p2www/pages/site/faq.html:877 msgid "There are many possible causes of high CPU usage. Here is a checklist:" -msgstr "" -"Hay muchas causas posibles para un elevado uso de la CPU. Aquí tiene una " -"lista para su comprobación:" +msgstr "Hay muchas causas posibles para un elevado uso de la CPU. Aquí tiene una lista para su comprobación:" #: i2p2www/pages/site/faq.html:882 msgid "Java Runtime Environment" @@ -4630,10 +3757,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"java -version at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing java -version at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." msgstr "" @@ -4643,14 +3768,9 @@ msgstr "Aplicaciones de intercambio de archivos, como BitTorrent" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." -msgstr "" -"¿Está ejecutando un cliente Bittorrent sobre I2P? Intente reducir el " -"número de torrents, \n" -"los límites de ancho de banda, o pruebe a apagarlo completamente a ver si" -" eso ayuda." +msgstr "¿Está ejecutando un cliente Bittorrent sobre I2P? Intente reducir el número de torrents, \nlos límites de ancho de banda, o pruebe a apagarlo completamente a ver si eso ayuda." #: i2p2www/pages/site/faq.html:895 msgid "High bandwidth settings" @@ -4658,17 +3778,9 @@ msgstr "Ajustes de gran ancho de banda" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for share bandwidth percentage on the " -"configuration page." -msgstr "" -"¿Están sus límites de ancho de banda configurados demasiado altos? Es " -"posible \n" -"que pase demasiado tráfico a través de su router I2P y esté saturado. " -"Intente reducir \n" -"el porcentaje de ancho de banda compartido en la página de configuración." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for share bandwidth percentage on the configuration page." +msgstr "¿Están sus límites de ancho de banda configurados demasiado altos? Es posible \nque pase demasiado tráfico a través de su router I2P y esté saturado. Intente reducir \nel porcentaje de ancho de banda compartido en la página de configuración." #: i2p2www/pages/site/faq.html:901 msgid "I2P Version" @@ -4676,11 +3788,9 @@ msgstr "Versión de I2P" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." -msgstr "" -"Asegúrese de usar la última versión de I2P para beneficiarse de las " -"mejoras de rendimiento y la solución de errores." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." +msgstr "Asegúrese de usar la última versión de I2P para beneficiarse de las mejoras de rendimiento y la solución de errores." #: i2p2www/pages/site/faq.html:907 msgid "Memory allocation" @@ -4688,12 +3798,9 @@ msgstr "Asignación de memoria" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on the graphs page \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting wrapper.java.maxmemory in the file " -"wrapper.config." +"Has enough memory been set aside for use by I2P? Look at the memory graph on the graphs page \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting wrapper.java.maxmemory in the file wrapper.config." msgstr "" #: i2p2www/pages/site/faq.html:915 @@ -4703,13 +3810,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." -msgstr "" -"¿El uso de la CPU es simplemente mayor de lo que te gustaría, o está " -"fijado en 100% durante mucho tiempo?\n" -"Si es así, podría tratarse de un error. Busca pistas en los registros." +msgstr "¿El uso de la CPU es simplemente mayor de lo que te gustaría, o está fijado en 100% durante mucho tiempo?\nSi es así, podría tratarse de un error. Busca pistas en los registros." #: i2p2www/pages/site/faq.html:922 msgid "Java-related" @@ -4718,18 +3821,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the jbigi page for instructions on " -"diagnosing, building, and testing methods." -msgstr "" -"Puede que esté usando la librería BigInteger en vez de la versión nativa," -" \n" -"especialmente si lo ejecuta en un sistema o hardware nuevo o inusual \n" -"(OpenSolaris, mipsel, etc). Visite la web de " -"jbigi que \n" -"incluye instrucciones para el diagnóstico, compilado y métodos de testeo." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the jbigi page for instructions on diagnosing, building, and testing methods." +msgstr "Puede que esté usando la librería BigInteger en vez de la versión nativa, \nespecialmente si lo ejecuta en un sistema o hardware nuevo o inusual \n(OpenSolaris, mipsel, etc). Visite la web de jbigi que \nincluye instrucciones para el diagnóstico, compilado y métodos de testeo." #: i2p2www/pages/site/faq.html:929 msgid "Participating tunnels" @@ -4737,217 +3831,109 @@ msgstr "Túneles participantes" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the confignet page,\n" -"or by setting router.maxParticipatingTunnels=nnn on the configadvanced " -"page." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the confignet page,\n" +"or by setting router.maxParticipatingTunnels=nnn on the configadvanced page." msgstr "" #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" http://localhost:7657/config" +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" http://localhost:7657/config" msgstr "" #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." -msgstr "" -"No, no pasa nada. \n" -"Es un comportamiento normal. \n" -"Todos los routers se ajustan dinámicamente a las condiciones y demandas " -"cambiantes de la red. \n" -"Los routers se conectan y desconectan dependiendo de si el sistema en el " -"que están instalados está operativo o no, así como de si hay una conexión" -" de red disponible. \n" -"El router actualiza constantemente su base de datos de red local. \n" -"Los túneles en los que participa su router expiran cada 10 minutos y " -"pueden o no ser reconstruidos a través de su router." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." +msgstr "No, no pasa nada. \nEs un comportamiento normal. \nTodos los routers se ajustan dinámicamente a las condiciones y demandas cambiantes de la red. \nLos routers se conectan y desconectan dependiendo de si el sistema en el que están instalados está operativo o no, así como de si hay una conexión de red disponible. \nEl router actualiza constantemente su base de datos de red local. \nLos túneles en los que participa su router expiran cada 10 minutos y pueden o no ser reconstruidos a través de su router." #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" -msgstr "" -"El cifrado y el encaminamiento dentro de la red I2P añaden una cantidad " -"considerable de sobrecarga y limitan el ancho de banda. \n" -"\n" -"Podemos intentar aclararlo con ayuda de un diagrama:" +msgstr "El cifrado y el encaminamiento dentro de la red I2P añaden una cantidad considerable de sobrecarga y limitan el ancho de banda. \n\nPodemos intentar aclararlo con ayuda de un diagrama:" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." -msgstr "" -"En este diagrama se muestra la ruta que sigue el tráfico I2P en su viaje " -"por la red. \n" -"El enrutador I2P de un usuario está representado por la casilla \"A\" y " -"un servicio oculto I2P (por ejemplo, el sitio web http://stats.i2p) por " -"la casilla \"B\". \n" -"Tanto el cliente como el servidor utilizan túneles de 3 saltos, " -"representados por las casillas \"P\", \"Q\", \"R\", \"X\", \"Y\", \"Z\", " -"\"P_1\", \"Q_1\", \"R'_1, \"X_1\", \"Y_1\" y \"Z_1\"." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +msgstr "En este diagrama se muestra la ruta que sigue el tráfico I2P en su viaje por la red. \nEl enrutador I2P de un usuario está representado por la casilla \"A\" y un servicio oculto I2P (por ejemplo, el sitio web http://stats.i2p) por la casilla \"B\". \nTanto el cliente como el servidor utilizan túneles de 3 saltos, representados por las casillas \"P\", \"Q\", \"R\", \"X\", \"Y\", \"Z\", \"P_1\", \"Q_1\", \"R'_1, \"X_1\", \"Y_1\" y \"Z_1\"." #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." -msgstr "" -"Las casillas \"P\", \"Q\" y \"R\" representan un túnel de salida para A, " -"mientras que las casillas \"X_1\", \"Y_1\" y \"Z_1\" representan un túnel" -" de salida para \"B\". \n" -"Del mismo modo, las casillas \"X\", \"Y\" y \"Z\" representan un túnel de" -" entrada para \"B\", mientras que las casillas \"P_1\", \"Q_1\" y \"R_1\"" -" representan un túnel de entrada para \"A\". \n" -"Las flechas entre las casillas indican el sentido del tráfico. \n" -"El texto encima y debajo de las flechas muestra ejemplos de ancho de " -"banda entre un par de saltos y ejemplos de latencia." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." +msgstr "Las casillas \"P\", \"Q\" y \"R\" representan un túnel de salida para A, mientras que las casillas \"X_1\", \"Y_1\" y \"Z_1\" representan un túnel de salida para \"B\". \nDel mismo modo, las casillas \"X\", \"Y\" y \"Z\" representan un túnel de entrada para \"B\", mientras que las casillas \"P_1\", \"Q_1\" y \"R_1\" representan un túnel de entrada para \"A\". \nLas flechas entre las casillas indican el sentido del tráfico. \nEl texto encima y debajo de las flechas muestra ejemplos de ancho de banda entre un par de saltos y ejemplos de latencia." #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." -msgstr "" -"Cuando tanto el cliente como el servidor utilizan túneles de 3 saltos, un" -" total de otros 12 enrutadores I2P participan en la retransmisión del " -"tráfico. \n" -"6 peers retransmiten el tráfico del cliente al servidor, que se divide en" -" un túnel de salida de 3 saltos desde \"A\" (\"P\", \"Q\", \"R\") y un " -"túnel de entrada de 3 saltos hacia \"B\" (\"X\", \"Y\", \"Z\"). \n" -"Del mismo modo, 6 pares retransmiten el tráfico desde el servidor hasta " -"el cliente." +msgstr "Cuando tanto el cliente como el servidor utilizan túneles de 3 saltos, un total de otros 12 enrutadores I2P participan en la retransmisión del tráfico. \n6 peers retransmiten el tráfico del cliente al servidor, que se divide en un túnel de salida de 3 saltos desde \"A\" (\"P\", \"Q\", \"R\") y un túnel de entrada de 3 saltos hacia \"B\" (\"X\", \"Y\", \"Z\"). \nDel mismo modo, 6 pares retransmiten el tráfico desde el servidor hasta el cliente." #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" -msgstr "" -"En primer lugar, podemos considerar la latencia: el tiempo que tarda una " -"solicitud de un cliente en atravesar la red I2P, llegar al servidor y " -"volver al cliente. \n" -"Sumando todas las latencias vemos que:" +msgstr "En primer lugar, podemos considerar la latencia: el tiempo que tarda una solicitud de un cliente en atravesar la red I2P, llegar al servidor y volver al cliente. \nSumando todas las latencias vemos que:" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." -msgstr "" -"En nuestro ejemplo, el tiempo total de ida y vuelta asciende a 740 ms, " -"mucho más de lo que se tarda normalmente en navegar por sitios web " -"normales." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." +msgstr "En nuestro ejemplo, el tiempo total de ida y vuelta asciende a 740 ms, mucho más de lo que se tarda normalmente en navegar por sitios web normales." #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." msgstr "" #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the http://localhost:7657/config " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the http://localhost:7657/config page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." msgstr "" #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." -msgstr "" -"También recomendamos establecer una cantidad suficiente de ancho de banda" -" compartido - esto permite que los túneles participantes sean enrutados a" -" través de su router I2P. \n" -"Permitir el tráfico participante mantiene su router bien integrado en la " -"red y mejora sus velocidades de transferencia." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." +msgstr "También recomendamos establecer una cantidad suficiente de ancho de banda compartido - esto permite que los túneles participantes sean enrutados a través de su router I2P. \nPermitir el tráfico participante mantiene su router bien integrado en la red y mejora sus velocidades de transferencia." #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, install the latest " -"release." -msgstr "" -"I2P es un trabajo en curso. Muchas mejoras y arreglos están siendo " -"implementadas, y generalmente usando la última versión mejorará el " -"rendimiento. Si no la tiene, instale la " -"última versión." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, install the latest release." +msgstr "I2P es un trabajo en curso. Muchas mejoras y arreglos están siendo implementadas, y generalmente usando la última versión mejorará el rendimiento. Si no la tiene, instale la última versión." #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." -msgstr "" -"Puedes informar de cualquier error/problema que encuentres en nuestro " -"bugtracker, que está disponible tanto en Internet no privado como en I2P." -" \n" -"Tenemos un foro de debate, también disponible en I2P y en Internet no " -"privado. También puedes unirte a nuestro canal de IRC: \n" -"ya sea a través de nuestra red IRC, IRC2P, o en Freenode." +msgstr "Puedes informar de cualquier error/problema que encuentres en nuestro bugtracker, que está disponible tanto en Internet no privado como en I2P. \nTenemos un foro de debate, también disponible en I2P y en Internet no privado. También puedes unirte a nuestro canal de IRC: \nya sea a través de nuestra red IRC, IRC2P, o en Freenode." #: i2p2www/pages/site/faq.html:1044 msgid "Our Bugtracker:" @@ -4967,14 +3953,10 @@ msgstr "Nuestros foros:" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" PrivateBin Wiki, or an I2P paste service such as this \n" -" PrivateBin instance or this" -" \n" -" Javascript-free paste service and" -" follow up on IRC in #i2p<" +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" PrivateBin Wiki, or an I2P paste service such as this \n" +" PrivateBin instance or this \n" +" Javascript-free paste service and follow up on IRC in #i2p<" msgstr "" #: i2p2www/pages/site/faq.html:1054 @@ -4983,13 +3965,10 @@ msgstr "Únete a #i2p-dev Discute con los desarrolladores en IRC" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "http://127.0.0.1:7657/logs.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." msgstr "" #: i2p2www/pages/site/faq.html:1070 @@ -5000,8 +3979,7 @@ msgid "" "
  • on irc.freenode.net channel #i2p
  • \n" "
  • on IRC2P channel #i2p
  • \n" "\n" -"or post to the forum and we'll post it " -"here (with the answer, hopefully)." +"or post to the forum and we'll post it here (with the answer, hopefully)." msgstr "" #: i2p2www/pages/site/impressum.html:4 @@ -5015,12 +3993,9 @@ msgstr "Red anónima I2P" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." -msgstr "" -"Capa anónima de comunicación distribuida par-a-par construida con " -"herramientas de código libre y diseñada para usar cualquier servicio de " -"internet tradicional como email, IRC, foros o páginas webs." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." +msgstr "Capa anónima de comunicación distribuida par-a-par construida con herramientas de código libre y diseñada para usar cualquier servicio de internet tradicional como email, IRC, foros o páginas webs." #: i2p2www/pages/site/index.html:8 msgid "Welcome to the Invisible Internet" @@ -5028,14 +4003,9 @@ msgstr "Bienvenido a Internet invisible" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" -" " -msgstr "" -"Internet Invisible es una red de privacidad por diseño, impulsada por las" -" personas. Es una alternativa a Internet verdaderamente libre y anónima. " -"Consigue I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " +msgstr "Internet Invisible es una red de privacidad por diseño, impulsada por las personas. Es una alternativa a Internet verdaderamente libre y anónima. Consigue I2P.\n " #: i2p2www/pages/site/index.html:11 #, python-format @@ -5049,24 +4019,11 @@ msgstr "¿Qué es I2P?" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." -msgstr "" -"\n" -" El Proyecto Internet Invisible (I2P) es una capa de red privada " -"totalmente encriptada.\n" -" Protege su actividad y localización. Cada día la gente utiliza la" -" red para conectarse\n" -" con otras personas sin preocuparse de que las rastreen o " -"recopilen sus datos. En algunos\n" -" En algunos casos, la gente confía en la red cuando necesita ser " -"discreta o está realizando un trabajo delicado." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." +msgstr "\n El Proyecto Internet Invisible (I2P) es una capa de red privada totalmente encriptada.\n Protege su actividad y localización. Cada día la gente utiliza la red para conectarse\n con otras personas sin preocuparse de que las rastreen o recopilen sus datos. En algunos\n En algunos casos, la gente confía en la red cuando necesita ser discreta o está realizando un trabajo delicado." #: i2p2www/pages/site/index.html:23 msgid "I2P Cares About Privacy" @@ -5075,22 +4032,14 @@ msgstr "" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." -msgstr "" -"I2P oculta el servidor al usuario y el usuario al servidor. Todo el " -"tráfico I2P es interno a la red I2P. El tráfico dentro de I2P no " -"interactúa directamente con Internet. Es una capa superior a Internet. " -"Utiliza túneles unidireccionales encriptados entre usted y sus pares. " -"Nadie puede ver de dónde viene el tráfico, a dónde va o cuál es su " -"contenido. Además, I2P ofrece resistencia al reconocimiento de patrones y" -" al bloqueo por parte de los censores. Como la red se basa en los pares " -"para enrutar el tráfico, también se reduce el bloqueo por localización." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." +msgstr "I2P oculta el servidor al usuario y el usuario al servidor. Todo el tráfico I2P es interno a la red I2P. El tráfico dentro de I2P no interactúa directamente con Internet. Es una capa superior a Internet. Utiliza túneles unidireccionales encriptados entre usted y sus pares. Nadie puede ver de dónde viene el tráfico, a dónde va o cuál es su contenido. Además, I2P ofrece resistencia al reconocimiento de patrones y al bloqueo por parte de los censores. Como la red se basa en los pares para enrutar el tráfico, también se reduce el bloqueo por localización." #: i2p2www/pages/site/index.html:27 msgid "Read more…" @@ -5103,13 +4052,9 @@ msgstr "" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." -msgstr "" -"La red está impulsada por las personas. Los pares ponen una parte de sus " -"recursos, en particular el ancho de banda, a disposición de los demás " -"participantes en la red. Esto permite que la red funcione sin depender de" -" servidores centralizados." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." +msgstr "La red está impulsada por las personas. Los pares ponen una parte de sus recursos, en particular el ancho de banda, a disposición de los demás participantes en la red. Esto permite que la red funcione sin depender de servidores centralizados." #: i2p2www/pages/site/index.html:33 msgid "Learn more about the Protocol Stack" @@ -5123,9 +4068,7 @@ msgstr "Privacidad y seguridad por diseño" msgid "" "I2P has created transport protocols that resist DPI censorship, and " "continuously improves its end to end encryption." -msgstr "" -"I2P ha creado protocolos de transporte resistentes a la censura DPI y " -"mejora continuamente su cifrado de extremo a extremo." +msgstr "I2P ha creado protocolos de transporte resistentes a la censura DPI y mejora continuamente su cifrado de extremo a extremo." #: i2p2www/pages/site/index.html:37 msgid "Read the I2P Transport Overview" @@ -5159,11 +4102,8 @@ msgstr "Enlaces recomendados y más recursos" #, python-format msgid "" "See also the page with\n" -"links to presentations, videos, and tutorials about" -" I2P." -msgstr "" -"Vea también la web con a href=\"%(media)s\">enlaces a presentaciones, " -"vídeos, y manuales sobre I2P." +"links to presentations, videos, and tutorials about I2P." +msgstr "Vea también la web con a href=\"%(media)s\">enlaces a presentaciones, vídeos, y manuales sobre I2P." #: i2p2www/pages/site/links.html:12 msgid "I2P on the web" @@ -5188,4 +4128,3 @@ msgstr "Foros, sitio de noticias y otros" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" msgstr "Cosas muy antiguas" - diff --git a/i2p2www/translations/es_AR/LC_MESSAGES/research.po b/i2p2www/translations/es_AR/LC_MESSAGES/research.po index 1414dbb5..8b8bfe84 100644 --- a/i2p2www/translations/es_AR/LC_MESSAGES/research.po +++ b/i2p2www/translations/es_AR/LC_MESSAGES/research.po @@ -1,23 +1,22 @@ -# Spanish (Argentina) translations for I2P. -# Copyright (C) 2021 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2022 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2022-08-21 15:33+0000\n" "PO-Revision-Date: 2013-07-15 12:01+0000\n" "Last-Translator: FULL NAME \n" -"Language-Team: Spanish (Argentina) " -"(http://www.transifex.com/otf/I2P/language/es_AR/)\n" -"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 " -"? 1 : 2\n" +"Language-Team: Spanish (Argentina) (http://app.transifex.com/otf/I2P/language/es_AR/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es_AR\n" +"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -26,7 +25,7 @@ msgstr "Investigación académica" #: i2p2www/pages/site/research/index.html:3 #: i2p2www/pages/site/research/questions.html:3 msgid "May 2018" -msgstr "" +msgstr "Mayo de 2018" #: i2p2www/pages/site/research/index.html:6 msgid "Introduction" @@ -34,140 +33,103 @@ msgstr "Introducción" #: i2p2www/pages/site/research/index.html:8 msgid "Research on the I2P Network" -msgstr "" +msgstr "Investigación sobre la red I2P" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." -msgstr "" +msgstr "I2P es un proyecto único que, por desgracia, no ha recibido la atención académica que merece.\nHasta la fecha, la mayor parte de la investigación tecnología de enrutamiento cebolla\nha sido en torno a Tor, y mientras que los estudios nos benefician también, \nhay una gran necesidad de investigación centrada en I2P. Esto juega un papel clave\ntanto en el mantenimiento de la seguridad y la integridad de la red, así como \npara abrir puertas a futuros desarrollos más impactantes." #: i2p2www/pages/site/research/index.html:19 #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "Free Haven Anonymity Bibliography.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" -msgstr "" -"\n" -"Hay una gran comunidad investigando un amplio rango de aspectos sobre el " -"anonimato. Para una lista actualizada y completa de trabajos, vea la bibliografía de anonimato del proyecto Free " -"Haven. I2P se beneficia mucho de la investigación acerca deTor y el " -"enrutamiento onion, pero hay poco interés dedicado al estudio de la " -"teoría tras I2P, y sobre las elecciones y equilibrios que produce la red." -" Esto presenta una oportunidad única para la investigación original.\n" +msgstr "\nHay una gran comunidad investigando un amplio rango de aspectos sobre el anonimato. Para una lista actualizada y completa de trabajos, vea la bibliografía de anonimato del proyecto Free Haven. I2P se beneficia mucho de la investigación acerca deTor y el enrutamiento onion, pero hay poco interés dedicado al estudio de la teoría tras I2P, y sobre las elecciones y equilibrios que produce la red. Esto presenta una oportunidad única para la investigación original.\n" #: i2p2www/pages/site/research/index.html:29 #, python-format msgid "" "A list of known published papers about I2P is available here." -msgstr "" -"Una lista de ensayos publicados sobre I2P está disponible aquí." +msgstr "Una lista de ensayos publicados sobre I2P está disponible aquí." #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" -msgstr "" +msgstr "\nEsta página tiene como objetivo esbozar los campos de investigación más necesarios, \nnotas para investigadores potenciales, nuestras directrices generales de seguridad y una lista \nde preguntas abiertas por las que puede empezar en cualquier momento.\n" #: i2p2www/pages/site/research/index.html:40 msgid "Notes to Researchers:" -msgstr "" +msgstr "Notas para los investigadores:" #: i2p2www/pages/site/research/index.html:42 msgid "Defensive Research" -msgstr "" +msgstr "Investigación defensiva" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" #: i2p2www/pages/site/research/index.html:54 msgid "Offensive and Analytic Tests" -msgstr "" +msgstr "Pruebas ofensivas y analíticas" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"please \n" -"communicate your ideas to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to please \n" +"communicate your ideas to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" #: i2p2www/pages/site/research/index.html:71 msgid "Research Ethics & Testing the Network" -msgstr "" +msgstr "Ética de la investigación & Probando la red" #: i2p2www/pages/site/research/index.html:73 msgid "General Guidelines" -msgstr "" +msgstr "Directrices generales" #: i2p2www/pages/site/research/index.html:75 msgid "" "
      \n" "
    1. \n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" "
    2. \n" "
    3. \n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" "
    4. \n" "
    5. \n" @@ -175,10 +137,8 @@ msgid "" " collecting data about yourself\n" "
    6. \n" "
    7. \n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" "
    8. \n" "
    9. \n" @@ -186,10 +146,8 @@ msgid "" " publication and collect as little as possible\n" "
    10. \n" "
    11. \n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is not intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is not intended to be private by the\n" " originator\n" "
    12. \n" "
    " @@ -197,53 +155,42 @@ msgstr "" #: i2p2www/pages/site/research/index.html:106 msgid "Using a Test Network to Attack I2P" -msgstr "" +msgstr "Usando una red de prueba para atacar I2P" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add i2p.vmCommSystem=true to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add i2p.vmCommSystem=true to the\n" "router.config before starting." msgstr "" #: i2p2www/pages/site/research/index.html:131 msgid "Testing on the Live I2P Network" -msgstr "" +msgstr "Pruebas en la red I2P en vivo" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please contact\n" +"As stated above in the researcher notes, please contact\n" " us before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -253,35 +200,23 @@ msgstr "Configuración de familia de routers I2P" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -295,7 +230,7 @@ msgstr "Base de datos de red" #: i2p2www/pages/site/research/questions.html:6 msgid "Floodfills" -msgstr "" +msgstr "Vertederos" #: i2p2www/pages/site/research/questions.html:19 msgid "Transports" @@ -327,7 +262,7 @@ msgstr "Anonimato" #: i2p2www/pages/site/research/questions.html:75 msgid "Network Related" -msgstr "" +msgstr "Relacionados con la red" #: i2p2www/pages/site/research/vrp.html:2 msgid "Vulnerability Response Process" @@ -336,35 +271,24 @@ msgstr "Proceso de respuesta a la vulnerabilidad (VRP)" #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." -msgstr "" -"\n" -"Este proceso está sujeto a cambio. Por favor, refiérase a esta página " -"para el actual VRP." +"This process is subject to change. Please refer to this page for the current VRP." +msgstr "\nEste proceso está sujeto a cambio. Por favor, refiérase a esta página para el actual VRP." #: i2p2www/pages/site/research/vrp.html:10 msgid "This page was last updated in June 2020." -msgstr "" +msgstr "Esta página se actualizó por última vez en junio de 2020." #: i2p2www/pages/site/research/vrp.html:12 msgid "" -"Researchers: while you research/hack, we ask that you refrain from the " -"following: - Performing active exploits or Denial of Service attacks on " -"the\n" -"i2p network - Performing social engineering on i2p development team " -"members - Performing any physical or electronic attempts against i2p " -"property and/or data\n" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" "centers" msgstr "" #: i2p2www/pages/site/research/vrp.html:15 msgid "" -"As i2p is an open-source community, many volunteers and development team " -"members run their own I2P Sites as well as public (“non-private " -"internet”) domains. These\n" -"sites/servers are NOT in the scope of the vulnerability assessment / " -"response process, only the underlying code of i2p is." +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." msgstr "" #: i2p2www/pages/site/research/vrp.html:18 @@ -387,18 +311,13 @@ msgstr "Respuesta al incidente" #: i2p2www/pages/site/research/vrp.html:31 msgid "Researcher submits report via:" -msgstr "" +msgstr "El investigador presenta el informe a través de:" #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." -msgstr "" -"El equipo de respuesta designa un gestor de respuesta que se ocupa del " -"informe\n" -"en particular en base a la disponibilidad y/o al conjunto de " -"conocimientos." +msgstr "El equipo de respuesta designa un gestor de respuesta que se ocupa del informe\nen particular en base a la disponibilidad y/o al conjunto de conocimientos." #: i2p2www/pages/site/research/vrp.html:42 #, python-format @@ -409,14 +328,9 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." -msgstr "" -"El gestor de respuesta formula preguntas para satisfacer cualquier " -"información\n" -"necesaria y para confirmar si la entrega efectivamente indica una " -"vulnerabilidad." +msgstr "El gestor de respuesta formula preguntas para satisfacer cualquier información\nnecesaria y para confirmar si la entrega efectivamente indica una vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:52 msgid "If submission proves to be vulnerable, proceed." @@ -430,34 +344,26 @@ msgstr "Si no indica vulnerabilidad:" msgid "" "Response Manager responds with reasons why submission is not a " "vulnerability." -msgstr "" -"El gestor de respuesta responde con las razones por las que la entrega no" -" indica una vulnerabilidad." +msgstr "El gestor de respuesta responde con las razones por las que la entrega no indica una vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." -msgstr "" -"Si es necesario, el gestor de respuesta mueve la conversación a un " -"'ticket' nuevo o existente en un Trac público." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." +msgstr "Si es necesario, el gestor de respuesta mueve la conversación a un 'ticket' nuevo o existente en un Trac público." #: i2p2www/pages/site/research/vrp.html:70 msgid "" "\n" "Establish severity of vulnerability:\n" " " -msgstr "" -"\n" -"Establezca la gravedad de la vulnerabilidad:" +msgstr "\nEstablezca la gravedad de la vulnerabilidad:" #: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Affects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." -msgstr "" -"Repercute en la red como conjunto, tiene potencial para desbaratar la red" -" entera o está al nivel de una gran catástrofe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." +msgstr "Repercute en la red como conjunto, tiene potencial para desbaratar la red entera o está al nivel de una gran catástrofe." #: i2p2www/pages/site/research/vrp.html:79 msgid "Affects individual routers, or must be carefully exploited." @@ -474,29 +380,20 @@ msgstr "Responda de acuerdo a la gravedad de la vulnerabilidad:" #: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." -msgstr "" -"Las de gravedad ALTA deben notificarse en el sitio web y en la " -"suscripción\n" -"de novedades en %(limit)s días laborables desde su clasificación." +msgstr "Las de gravedad ALTA deben notificarse en el sitio web y en la suscripción\nde novedades en %(limit)s días laborables desde su clasificación." #: i2p2www/pages/site/research/vrp.html:98 -msgid "The notification should list appropriate steps for users to take, if any." -msgstr "" -"La notificación debe, en su caso, enumerar los pasos adecuados a seguir " -"por los usuarios." +msgid "" +"The notification should list appropriate steps for users to take, if any." +msgstr "La notificación debe, en su caso, enumerar los pasos adecuados a seguir por los usuarios." #: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." -msgstr "" -"La notificación no debe incluir detalle alguno que pudiera sugerir una " -"vía para\n" -"explotar la vulnerabilidad." +msgstr "La notificación no debe incluir detalle alguno que pudiera sugerir una vía para\nexplotar la vulnerabilidad." #: i2p2www/pages/site/research/vrp.html:105 msgid "The latter takes precedence over the former." @@ -517,8 +414,8 @@ msgstr "El equipo de respuesta aplica el/los parche(s) apropiado(s)." #: i2p2www/pages/site/research/vrp.html:122 msgid "" "Response Manager works on a patch LOCALLY, patches are shared by the " -"response team via PGP-encrypted e-mail until such a time as it is safe to" -" expose to the public." +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" #: i2p2www/pages/site/research/vrp.html:125 @@ -527,14 +424,9 @@ msgstr "Los parches se revisan con el investigador." #: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." -msgstr "" -"Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante " -"el periodo de revisión no debe hacer referencia a la naturaleza de " -"seguridad del ramal (branch) PRIVADO o de sus consignaciones." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." +msgstr "Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante el periodo de revisión no debe hacer referencia a la naturaleza de seguridad del ramal (branch) PRIVADO o de sus consignaciones." #: i2p2www/pages/site/research/vrp.html:132 msgid "Vulnerability announcement is drafted." @@ -560,33 +452,22 @@ msgstr "Se discute la fecha de publicación." msgid "" "At release date, Response Team coordinates with developers to finalize " "update:" -msgstr "" -"En la fecha de publicación, el equipo de respuesta se coordina con los " -"desarrolladores para culminar la actualización:" +msgstr "En la fecha de publicación, el equipo de respuesta se coordina con los desarrolladores para culminar la actualización:" #: i2p2www/pages/site/research/vrp.html:156 msgid "Response Manager propagates the \"hotfix branch\" to trunk." -msgstr "" -"El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección " -"urgente) a trunk (ramal troncal)." +msgstr "El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección urgente) a trunk (ramal troncal)." #: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." -msgstr "" -"El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad " -"en las notas de la versión." +"Response Manager includes vulnerability announcement draft in release notes." +msgstr "El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad en las notas de la versión." #: i2p2www/pages/site/research/vrp.html:162 msgid "" -"Proceed with the Point or Regular Release. At this time, it is not " -"possible to release an in-network update for only one operating system or" -"\n" -"\t\tarchitecture. In order that all affected products can be released as " -"quickly as possible, the person responsible\n" -"\t\tfor that software should be able to perform necessary release " -"processes in a timely manner. Importantly this should include\n" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" @@ -596,24 +477,20 @@ msgstr "Proceso de divulgación post-publicación" #: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." -msgstr "" -"El equipo de respuesta tiene %(limit)s días para satisfacer todos los " -"puntos dentro de la sección III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." +msgstr "El equipo de respuesta tiene %(limit)s días para satisfacer todos los puntos dentro de la sección III." #: i2p2www/pages/site/research/vrp.html:179 -msgid "If the Incident Response process in section III is successfully completed:" -msgstr "" -"Si el proceso de respuesta a incidente en la sección III se completa con " -"éxito:" +msgid "" +"If the Incident Response process in section III is successfully completed:" +msgstr "Si el proceso de respuesta a incidente en la sección III se completa con éxito:" #: i2p2www/pages/site/research/vrp.html:183 msgid "" "Response Manager contacts researcher and asks if researcher wishes for " "credit." -msgstr "" -"El gestor de respuesta contacta con el investigador y le pregunta si " -"desea aparecer en los créditos." +msgstr "El gestor de respuesta contacta con el investigador y le pregunta si desea aparecer en los créditos." #: i2p2www/pages/site/research/vrp.html:186 msgid "Finalize vulnerability announcement draft and include the following:" @@ -632,10 +509,7 @@ msgid "" "Versions known to be not affected (for example, the vulnerable code was " "introduced in a recent version, and older versions are therefore " "unaffected)." -msgstr "" -"Versiones que se sabe que no están afectadas (por ejemplo, si el código " -"vulnerable fue introducido en una versión reciente, las versiones " -"anteriores no están afectadas)." +msgstr "Versiones que se sabe que no están afectadas (por ejemplo, si el código vulnerable fue introducido en una versión reciente, las versiones anteriores no están afectadas)." #: i2p2www/pages/site/research/vrp.html:199 msgid "Versions not checked." @@ -647,9 +521,7 @@ msgstr "Tipo de vulnerabilidad y su impacto." #: i2p2www/pages/site/research/vrp.html:205 msgid "If already obtained or applicable, a CVE-ID." -msgstr "" -"Si ya se obtuvo o se aplica, un CVE-ID (identificador de " -"vulnerabilidades)." +msgstr "Si ya se obtuvo o se aplica, un CVE-ID (identificador de vulnerabilidades)." #: i2p2www/pages/site/research/vrp.html:208 msgid "The planned, coordinated release date." @@ -659,105 +531,72 @@ msgstr "La fecha planeada de publicación coordinada." msgid "" "Mitigating factors (for example, the vulnerability is only exposed in " "uncommon, non-default configurations)." -msgstr "" -"Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con" -" configuraciones infrecuentes, y no predeterminadas)." +msgstr "Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con configuraciones infrecuentes, y no predeterminadas)." #: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." -msgstr "" -"Soluciones auxiliares (cambios que el usuario puede hacer en la " -"configuración para reducir su exposición a la vulnerabilidad)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." +msgstr "Soluciones auxiliares (cambios que el usuario puede hacer en la configuración para reducir su exposición a la vulnerabilidad)." #: i2p2www/pages/site/research/vrp.html:217 msgid "If applicable, credits to the original reporter." msgstr "Si se aplica, créditos al informante original." #: i2p2www/pages/site/research/vrp.html:222 -msgid "Release finalized vulnerability announcement on website and in news feed." -msgstr "" -"Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y" -" en la suscripción de novedades." +msgid "" +"Release finalized vulnerability announcement on website and in news feed." +msgstr "Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y en la suscripción de novedades." #: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" -msgstr "" -"Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la " -"versión en listas de correo bien-conocidas:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" +msgstr "Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la versión en listas de correo bien-conocidas:" #: i2p2www/pages/site/research/vrp.html:238 msgid "If applicable, developers request a CVE-ID." -msgstr "" -"Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de " -"vulnerabilidad)." +msgstr "Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de vulnerabilidad)." #: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." -msgstr "" -"Se hace referencia también a la consignación (commit) que aplicó la " -"corrección en una futura consignación, y se incluye un CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." +msgstr "Se hace referencia también a la consignación (commit) que aplicó la corrección en una futura consignación, y se incluye un CVE-ID." #: i2p2www/pages/site/research/vrp.html:250 msgid "" "If the Incident Response process in section III is *not* successfully " "completed:" -msgstr "" -"Si el proceso de respuesta a incidente en la sección III *no* se completó" -" con éxito:" +msgstr "Si el proceso de respuesta a incidente en la sección III *no* se completó con éxito:" #: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." -msgstr "" -"El equipo de respuesta y los desarolladores organizan una reunión en el " -"IRC para\n" -"discutir por qué y qué puntos de la sección III no se resolvieron, y cómo" -" puede el equipo resolverlos en el futuro." +msgstr "El equipo de respuesta y los desarolladores organizan una reunión en el IRC para\ndiscutir por qué y qué puntos de la sección III no se resolvieron, y cómo puede el equipo resolverlos en el futuro." #: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." -msgstr "" -"Cualquier reunión de desarrolladores inmediatamente a continuación del " -"incidente\n" -"debe incluir los puntos en la sección V." +msgstr "Cualquier reunión de desarrolladores inmediatamente a continuación del incidente\ndebe incluir los puntos en la sección V." #: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." -msgstr "" -"Si surgen disputas acerca de si divulgar o no información acerca de una\n" -"vulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá " -"públicamente\n" -"el problema en el IRC e intentará alcanzar un consenso." +msgstr "Si surgen disputas acerca de si divulgar o no información acerca de una\nvulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá públicamente\nel problema en el IRC e intentará alcanzar un consenso." #: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." -msgstr "" -"Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\n" -"de %(limit)s días), el investigador (tras %(limit)s días) está totalmente" -"\n" -"legitimado para exponer la vulnerabilidad al público." +msgstr "Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\nde %(limit)s días), el investigador (tras %(limit)s días) está totalmente\nlegitimado para exponer la vulnerabilidad al público." #: i2p2www/pages/site/research/vrp.html:277 msgid "Incident Analysis" @@ -769,10 +608,9 @@ msgstr "Aislar el código base" #: i2p2www/pages/site/research/vrp.html:282 #: i2p2www/pages/site/research/vrp.html:302 -msgid "Response Team and developers should coordinate to work on the following:" -msgstr "" -"El equipo de respuesta y los desarrolladores deben coordinarse para " -"trabajar en lo siguiente:" +msgid "" +"Response Team and developers should coordinate to work on the following:" +msgstr "El equipo de respuesta y los desarrolladores deben coordinarse para trabajar en lo siguiente:" #: i2p2www/pages/site/research/vrp.html:286 msgid "Problematic implementation of classes/libraries/functions, etc." @@ -792,9 +630,7 @@ msgstr "Auditoría" #: i2p2www/pages/site/research/vrp.html:306 msgid "Auditing of problem area(s) as discussed in point 1." -msgstr "" -"Auditado de la(s) área(s) problemáticas tal como se discutió en el punto " -"1." +msgstr "Auditado de la(s) área(s) problemáticas tal como se discutió en el punto 1." #: i2p2www/pages/site/research/vrp.html:309 msgid "Generate internal reports and store for future reference." @@ -802,22 +638,15 @@ msgstr "Generar informes internos y almacenarlos para futura referencia." #: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." -msgstr "" -"Si los resultados no son información sensible, compartirlos con el " -"público vía IRC o mediante el Trac público." +"If results are not sensitive, share with the public via IRC or public Trac." +msgstr "Si los resultados no son información sensible, compartirlos con el público vía IRC o mediante el Trac público." #: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." -msgstr "" -"El equipo de respuesta dispone de %(limit)s días tras completar la " -"sección III\n" -"para asegurar el completado de la sección V." +msgstr "El equipo de respuesta dispone de %(limit)s días tras completar la sección III\npara asegurar el completado de la sección V." #: i2p2www/pages/site/research/vrp.html:326 msgid "Resolutions" @@ -825,17 +654,10 @@ msgstr "Resoluciones" #: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" -msgstr "" -"En relación a el/los incidente(s), cualquier pregunta o resolución " -"adicional\n" -"entre el investigador y el equipo de respuesta y desarrollo tras la " -"divulgación\n" -"pública, puede ser abordado mediante lo siguiente:" +msgstr "En relación a el/los incidente(s), cualquier pregunta o resolución adicional\nentre el investigador y el equipo de respuesta y desarrollo tras la divulgación\npública, puede ser abordado mediante lo siguiente:" #: i2p2www/pages/site/research/vrp.html:341 msgid "Continuous Improvement" @@ -843,22 +665,15 @@ msgstr "Mejora continua" #: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." -msgstr "" -"El equipo de respuesta y los desarrolladores deben mantener reuniones " -"anuales\n" -"para revisar los incidentes del año anterior." +msgstr "El equipo de respuesta y los desarrolladores deben mantener reuniones anuales\npara revisar los incidentes del año anterior." #: i2p2www/pages/site/research/vrp.html:349 msgid "" "Response Team or designated person(s) should give a brief presentation, " "including:" -msgstr "" -"El equipo de respuesta o la(s) persona(s) designada(s) debe(n) " -"proporcionar una\n" -"presentación breve, incluyendo:" +msgstr "El equipo de respuesta o la(s) persona(s) designada(s) debe(n) proporcionar una\npresentación breve, incluyendo:" #: i2p2www/pages/site/research/vrp.html:353 msgid "Areas of I2P affected by the incidents." @@ -866,15 +681,11 @@ msgstr "Áreas de I2P afectadas por los incidentes." #: i2p2www/pages/site/research/vrp.html:356 msgid "Any network downtime or monetary cost (if any) of the incidents." -msgstr "" -"Cualquier periodo de inactividad de la red o coste monetario (en su caso)" -" de los incidentes." +msgstr "Cualquier periodo de inactividad de la red o coste monetario (en su caso) de los incidentes." #: i2p2www/pages/site/research/vrp.html:359 msgid "Ways in which the incidents could have been avoided (if any)." -msgstr "" -"Maneras en las que los incidentes podrían haber sido evitados (en su " -"caso)." +msgstr "Maneras en las que los incidentes podrían haber sido evitados (en su caso)." #: i2p2www/pages/site/research/vrp.html:362 msgid "How effective this process was in dealing with the incidents." @@ -882,17 +693,12 @@ msgstr "En qué medida fue efectivo este proceso para encargarse de los incident #: i2p2www/pages/site/research/vrp.html:368 msgid "After the presentation, Response Team and developers should discuss:" -msgstr "" -"Tras la presentación, el equipo de respuesta y los desarrolladores deben " -"discutir:" +msgstr "Tras la presentación, el equipo de respuesta y los desarrolladores deben discutir:" #: i2p2www/pages/site/research/vrp.html:372 msgid "Potential changes to development processes to reduce future incidents." -msgstr "" -"Cambios potenciales en el desarrollo de procesos para reducir futuros " -"incidentes." +msgstr "Cambios potenciales en el desarrollo de procesos para reducir futuros incidentes." #: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "Cambios potenciales en este proceso para mejorar futuras respuestas." -