New translations
This commit is contained in:
3734
i2p2www/translations/ja/LC_MESSAGES/get-involved.po
Normal file
3734
i2p2www/translations/ja/LC_MESSAGES/get-involved.po
Normal file
File diff suppressed because it is too large
Load Diff
2249
i2p2www/translations/ro/LC_MESSAGES/about.po
Normal file
2249
i2p2www/translations/ro/LC_MESSAGES/about.po
Normal file
File diff suppressed because it is too large
Load Diff
676
i2p2www/translations/zh/LC_MESSAGES/comparison.po
Normal file
676
i2p2www/translations/zh/LC_MESSAGES/comparison.po
Normal file
@ -0,0 +1,676 @@
|
||||
# Chinese translations for I2P.
|
||||
# Copyright (C) 2015 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
# Translators:
|
||||
# linloveliang <oiiu19@yahoo.com>, 2015
|
||||
# YF <yfdyh000@gmail.com>, 2015
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2013-10-26 22:39+0000\n"
|
||||
"PO-Revision-Date: 2015-08-30 13:42+0000\n"
|
||||
"Last-Translator: linloveliang <oiiu19@yahoo.com>\n"
|
||||
"Language-Team: Chinese (China) "
|
||||
"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n"
|
||||
"Plural-Forms: nplurals=1; plural=0\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 2.0\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
msgstr "I2P与其他项目的比较"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:32
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
msgid "I2P Compared to Other Anonymous Networks"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:5
|
||||
msgid "The following networks are discussed on this page."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Most of the following sections are fairly old, and may not be accurate.\n"
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:153
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:165
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:175
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:197
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:209
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:220
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:229
|
||||
msgid "Paid VPN Services"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:230
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:236
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:235
|
||||
msgid "Others"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:2
|
||||
msgid "I2P Compared to Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:8
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Tor and Onion Routing are both anonymizing proxy networks, \n"
|
||||
"allowing people to tunnel out through their low latency mix \n"
|
||||
"network. The two primary differences between Tor / \n"
|
||||
"Onion-Routing and I2P are again related to differences in \n"
|
||||
"the threat model and the out-proxy design (though Tor\n"
|
||||
"supports hidden services as well). In addition, Tor\n"
|
||||
"takes the directory-based approach - providing a \n"
|
||||
"centralized point to manage the overall 'view' of the \n"
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:22
|
||||
msgid ""
|
||||
"The I2P/Tor outproxy functionality does have a few \n"
|
||||
"substantial weaknesses against certain attackers - \n"
|
||||
"once the communication leaves the mixnet, global passive\n"
|
||||
"adversaries can more easily mount traffic analysis. In \n"
|
||||
"addition, the outproxies have access to the cleartext \n"
|
||||
"of the data transferred in both directions, and \n"
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:34
|
||||
msgid ""
|
||||
"However, many people don't need to worry about those \n"
|
||||
"situations, as they are outside their threat model. It\n"
|
||||
"is, also, outside I2P's (formal) functional scope (if people want\n"
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:48
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:54
|
||||
msgid "Cell"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:54
|
||||
msgid "Message"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Client"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Router or Client"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:56
|
||||
msgid "Circuit"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:56
|
||||
msgid "Tunnel"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:57
|
||||
msgid "Directory"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:57
|
||||
msgid "NetDb"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:58
|
||||
msgid "Directory Server"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:58
|
||||
msgid "Floodfill Router"
|
||||
msgstr "种子路由器"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:59
|
||||
msgid "Entry Guards"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:59
|
||||
msgid "Fast Peers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:60
|
||||
msgid "Entry Node"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:60
|
||||
msgid "Inproxy"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:61
|
||||
msgid "Exit Node"
|
||||
msgstr "出口节点"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:61
|
||||
msgid "Outproxy"
|
||||
msgstr "出口代理"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:62
|
||||
msgid "Hidden Service"
|
||||
msgstr "隐身服务"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:62
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
msgid "Hidden Service Descriptor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
msgid "LeaseSet"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Introduction point"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
msgid "Inbound Gateway"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:65
|
||||
msgid "Node"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:65
|
||||
#: i2p2www/pages/site/comparison/tor.html:67
|
||||
#: i2p2www/pages/site/comparison/tor.html:70
|
||||
msgid "Router"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:66
|
||||
msgid "Onion Proxy"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:66
|
||||
msgid "I2PTunnel Client (more or less)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:67
|
||||
msgid "Relay"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "Rendezvous Point"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "somewhat like Inbound Gateway + Outbound Endpoint"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:69
|
||||
msgid "Router Descriptor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:69
|
||||
msgid "RouterInfo"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:70
|
||||
msgid "Server"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:73
|
||||
msgid "Benefits of Tor over I2P"
|
||||
msgstr "Tor 相对 I2P 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:76
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"大许多的用户群;在学术和黑客群体中被关注较多;\n"
|
||||
"来自于正式研究的匿名性、抵抗性和性能优势;有一个非匿名的,来自大学的领导者"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:82
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr "解决了一些 I2P 尚未解决的规模问题"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:83
|
||||
msgid "Has significant funding"
|
||||
msgstr "有可观的资金"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has more developers, including several that are funded"
|
||||
msgstr "有更多的开发者,其中有些是全职的"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:86
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"由于传输基于 TLS 和具有网桥,对国家级封锁有更强的抵抗性\n"
|
||||
"(I2P 有“完全限制路由”的提案,但还没有实现)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:91
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "足够大以至于它必须适应封锁和拒绝服务攻击"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:92
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:99
|
||||
msgid "More efficient with memory usage"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:100
|
||||
msgid "Tor client nodes have very low bandwidth overhead"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:102
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:108
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:113
|
||||
msgid "C, not Java (ewww)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:116
|
||||
msgid "Benefits of I2P over Tor"
|
||||
msgstr "I2P 相对 Tor 的优势"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:118
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr "专为隐藏服务设计和优化,在这方面比 Tor 快许多"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:119
|
||||
msgid "Fully distributed and self organizing"
|
||||
msgstr "完全分布式和自组织"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr "通过不断分析和比较性能,而不是根据目录声称的流量来选择节点"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:127
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"种子节点(“目录服务器”)是持续变化并且不被信任的,\n"
|
||||
"而不是硬编码写入"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:132
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr "足够小以至于它还没有被大量(或者根本没有)封锁或拒绝服务"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:133
|
||||
msgid "Peer-to-peer friendly"
|
||||
msgstr "P2P 友好"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Packet switched instead of circuit switched"
|
||||
msgstr "包交换而不是电路交换"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:137
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:143
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:149
|
||||
msgid ""
|
||||
"scale each client's connections at O(1) instead \n"
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:159
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
msgid ""
|
||||
"Protection against detecting client activity, even\n"
|
||||
"when an attacker is participating in the tunnel, as\n"
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:175
|
||||
msgid ""
|
||||
"Tunnels in I2P are short lived, decreasing the number\n"
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:183
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:190
|
||||
msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:196
|
||||
msgid "Integrated automatic update mechanism"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:197
|
||||
msgid "Both TCP and UDP transports"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:198
|
||||
msgid "Java, not C (ewww)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Other potential benefits of I2P but not yet implemented"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:202
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:205
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:211
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:218
|
||||
msgid ""
|
||||
"Various mixing strategies at the tunnel level (e.g.\n"
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
Reference in New Issue
Block a user